" "



:





.. 1 2 3 4 5 6 7 8 9 10 ... 377

Information Risk Management: A practitioner's guide, 2nd Edition: Information Risk Management: A practitioner's guide, 2nd Edition
: David Sutton
: BCS, The Chartered Institute for IT
: 2021
: 240
:
: pdf (true), epub
: 22.2 MB

Information risk management (IRM) is about identifying, assessing, prioritising and treating risks to keep information secure and available. This accessible book is a practical guide to understanding the principles of IRM and developing a strategic approach to an IRM programme. It is the only textbook for the BCS Practitioner Certificate in Information Risk Management and this new edition reflects recent changes to the syllabus and to the wider discipline. Some experts believe that the threat and vulnerability assessments should be carried out ahead of the impact assessments; others disagree and opt for the reverse arrangement. I believe that, in practice, either method will suffice as long as the information assets have been clearly identified, but that it can be extremely helpful if the threat and vulnerability assessments can be performed at the same time as impact assessments, since many of the threats and vulnerabilities will be apparent to the information asset owners.
: Ingvar16 , 17:03 | : 0 |
: A - Anonymous. ,
:
:
: 2021
: PDF
: 123
: 45.3 Mb
:

. . Anonymous, . ? . , , DOOM . GTA, Anonymous , . , , -100 . , .
: vitvikvas , 15:51 | : 0 |
Exam Ref MS-100 Microsoft 365 Identity and Services, 2nd Edition: Exam Ref MS-100 Microsoft 365 Identity and Services, 2nd Edition
: Orin Thomas
: Microsoft Press/Pearson Education
: 2022
: 368
:
: epub
: 45.3 MB

Prepare for the updated version of Microsoft Exam MS-100 and help demonstrate your real-world mastery of skills and knowledge needed to effectively design, deploy, manage, and secure Microsoft 365 services. Designed for experienced IT professionals, Exam Ref focuses on critical thinking and decision-making acumen needed for success at the Microsoft Certified Expert level. The MS-100 exam deals with advanced topics that require candidates to have an excellent working knowledge of Microsoft 365 identity and services functionality. Some of the exam relates to topics that even experienced Microsoft 365 administrators may rarely encounter unless they are consultants who deploy new Microsoft 365 tenancies on a regular basis.
: Ingvar16 , 19:20 | : 0 |
: Algorithmic Mechanism Design for Internet of Things Services Market
: Yutao Jiao, Ping Wang, Dusit Niyato
: Springer
: 2022
: ePUB, PDF
: 120
: 19,1 Mb
: English

This book establishes game-theoretical frameworks based on the mechanism design theory and proposes strategy-proof algorithms, to optimally allocate and price the related IoT services, so that the social welfare of IoT ecosystem or the service providers revenue can be maximized and the IoT service provision can be sustainable. This book is written by experts based on the recent research results on the interaction between the service providers and users in the IoT system. Since the IoT networks are essentially supported by data, communication, and computing resources, the book focuses on three representative IoT services, including the data analytics services, the cloud/fog computing services for blockchain networks, and the wireless powered data crowdsourcing services. Researchers, scientists, and engineers in the field of resource allocation and service management for future IoT ecosystem can benefit from the book. As such, this book provides valuable insights and practical methods, especially the novel deep learning-based mechanism that can be considered in the emerging IoT technology.
: vitvikvas , 15:09 | : 0 |

: Lifecycle IoT Security for Engineers
: Dhondge Kaustubh
: Artech House
: 2021
: PDF
: 215
: 16 mb
: English

This comprehensive resource provides a thorough introduction to the security risks, attack vectors and vulnerabilities an Internet of things (IoT) product and its network can face at different phases of its lifecycle. The risks at each stage of the development and operations (DevOps) lifecycle of an IoT product are analyzed. Examples of recent, relevant security threats faced by the industry are discussed and why the security breach happened, how it was resolved, and what could have been done to avoid them will be explained. Readers will learn the best practices to secure their IoT products, and networks in a holistic way.
: wildman , 13:47 | : 0 |
Future Networks, Services and Management: Underlay and Overlay, Edge, Applications, Slicing, Cloud, Space, AI/ML, and Quantum Computing: Future Networks, Services and Management: Underlay and Overlay, Edge, Applications, Slicing, Cloud, Space, AI/ML, and Quantum Computing
: Mehmet Toy
: Springer
: 2021
: 461
:
: pdf (true)
: 15.3 MB

Future networks will be heterogonous as the current networks. The main difference would be that the future networks will include hyperscalers and space networks and end-to-end automation. Perhaps the transaction-based usage billing for services is highly likely. In this book, we describe future applications and services, current and future underlay and overlay networks, an overall service architecture, an overall management architecture, and various techniques in building future networks and services such as routing, security, quality of service (QoS), burst switching, 5G and 6G, MEC, AI/ML, Application Programming Interfaces (APIs), Network Slicing, and Quantum Computing.
: Ingvar16 26-11-2021, 18:22 | : 0 |
Connectivity and Edge Computing in IoT: Customized Designs and AI-based Solutions: Connectivity and Edge Computing in IoT: Customized Designs and AI-based Solutions
: Jie Gao, Mushu Li, Weihua Zhuang
: Springer
: Wireless Networks
: 2021
: 177
:
: pdf (true), epub
: 21.1 MB

This book covers connectivity and edge computing solutions for representative Internet of Things (IoT) use cases, including industrial IoT, rural IoT, Internet of Vehicles (IoV), and mobile virtual reality (VR). Based on their unique characteristics and requirements, customized solutions are designed with targets such as supporting massive connections or seamless mobility and achieving low latency or high energy efficiency. Meanwhile, the book highlights the role of artificial intelligence (AI) in future IoT networks and showcases AI-based connectivity and edge computing solutions.
: Ingvar16 26-11-2021, 15:32 | : 0 |
: Internet of Things and Its Applications
: Sachi Nandan Mohanty, Jyotir Moy Chatterjee, Suneeta Satpathy
: Springer
: 2022
: PDF
: 562
: 23,5 Mb
: English

This book offers a holistic approach to the Internet of Things (IoT) model, covering both the technologies and their applications, focusing on uniquely identifiable objects and their virtual representations in an Internet-like structure. The authors add to the rapid growth in research on IoT communications and networks, confirming the scalability and broad reach of the core concepts. The book is filled with examples of innovative applications and real-world case studies. The authors also address the business, social, and legal aspects of the Internet of Things and explore the critical topics of security and privacy and their challenges for both individuals and organizations. The contributions are from international experts in academia, industry, and research.
: vitvikvas 26-11-2021, 12:48 | : 0 |
IoT and Cloud Computing for Societal Good: IoT and Cloud Computing for Societal Good
: Jitendra Kumar Verma, Deepak Saxena
: Springer
: EAI/Springer Innovations in Communication and Computing
: 2022
: 331
:
: pdf (true), epub
: 35.9 MB

Internet of Things (IoT) and Cloud Computing are two recent innovations that have transformed business and industry. This book gathers the state-of-the-art for industrial application of scientific and practical research in the Cloud and IoT paradigms to benefit society. The book is organized into four parts focusing on different aspects of IoT and cloud computing: Part III deals with the optimization of existing IoT and cloud technology. Chapter 12 discusses multi-modal feature analysis for precise human hand gesture recognition. This would find useful application particularly in the domain of virtual reality. Finally, Part IV of the book deals with the security and privacy in IoT and cloud computing. Chapter 16 discusses the application of artificial intelligence for enhancing security of IoT devices. Chapter 17 takes an outward perspective by focusing on cyber-attacks, attack vectors, and remedies in the context of IoT devices. Chapter 18 proposes a privacy-secure link utilization routing algorithm for improving performance in IoT and cloud computing.
: Ingvar16 25-11-2021, 20:07 | : 0 |
: Implementing Always On VPN: Modern Mobility with Microsoft Windows 10 and Windows Server 2022
: Richard M. Hicks
: Apress
: 2022
: PDF
: 373
: 18,7 Mb
: English

Implement and support Windows 10 Always On VPN, the successor to Microsoft's popular DirectAccess. This book teaches you everything you need to know to test and adopt the technology at your organization that is widely deployed around the world.
: vitvikvas 25-11-2021, 17:12 | : 0 |

.. 1 2 3 4 5 6 7 8 9 10 ... 377




 MirKnig.Su  2021