" "



:





.. 1 2 3 4 5 6 7 8 9 10 ... 335

:
: . ., . .
:
: 2021
C: 320
: pdf (ocr)
: 49
:

- , . - , , , , , . , , , , .
: rivasss , 11:58 | : 0 |
: Mike Meyers' CompTIA Security+ Certification Guide(Exam SY0-601), Third Edition
: Mike Meyers, Scott Jernigan
: McGraw-Hill Education
: 2021
: epub
: 832
: 46.3 Mb
: English

An up-to-date CompTIA Security+ exam guide from training and exam preparation guru Mike Meyer
In Mike Meyers CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601), the leading expert on CompTIA certification and training brings his highly effective methodology to IT security. Within each chapter, modules drill down on specific exam objectives, providing a clear learning path.
: bomboane , 21:34 | : 0 |

: Revolutionary Applications of Blockchain-Enabled Privacy and Access Control
: Surjit Singh, Anca Delia Jurcut
: IGI Global
: 2021
: PDF
: 297
: Mirknig.su
: 10 mb
: English

Revolutionary Applications of Blockchain-Enabled Privacy and Access Control focuses on the recent challenges, design, and issues in the field of blockchain technologies-enabled privacy and advanced security practices in computing and communication.
: siburit , 17:22 | : 0 |
Industry Use Cases on Blockchain Technology Applications in IoT and the Financial Sector: Industry Use Cases on Blockchain Technology Applications in IoT and the Financial Sector
: Zaigham Mahmood
: IGI Global
: 2021
: 427
:
: pdf (true), epub
: 24.3 MB

Industry Use Cases on Blockchain Technology Applications in IoT and the Financial Sector investigates blockchain technologys adoption and effectiveness in multiple industries and for the internet of things (IoT)-based applications, presents use cases from industrial and financial sectors as well as from other transaction-based services, and fills a gap in this respect by extending the existing body of knowledge in the suggested field. While highlighting topics such as cybersecurity, use cases, and models for blockchain implementation, this book is ideal for business managers, financial accountants, practitioners, researchers, academicians, and students interested in blockchain technologys role and implementation in IoT and the financial sector.
: Ingvar16 12-04-2021, 12:06 | : 0 |
: Security Issues and Privacy Threats in Smart Ubiquitous Computing
: Parikshit N. Mahalle (Editor), Gitanjali R. Shinde (Editor), Nilanjan Dey (Editor), Aboul Ella Hassanien (Editor)
: Springer
: 2021
: true pdf/epub
: 256
: 28.1 Mb
: English

This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing. The uniqueness of this book is the combination of important fields like the Internet of things and ubiquitous computing. It assumes that the readers goal is to achieve a complete understanding of IoT, smart computing, security issues, challenges and possible solutions. It is not oriented towards any specific use cases and security issues; privacy threats in ubiquitous computing problems are discussed across various domains.
: bomboane 12-04-2021, 10:24 | : 0 |
: Sensor Network Methodologies for Smart Applications (Advances in Information Security, Privacy, and Ethics)
: Salahddine Krit, Valentina Emilia Balas, Mohamed Elhoseny
: IGI Global
: 2020
: true pdf/epub
: 299
: 28.7 Mb
: English

Technologies in todays society are rapidly developing at a pace that is challenging to stay up to date with. As an increasing number of global regions are implementing smart methods and strategies for sustainable development, they are continually searching for modern advancements within computer science, sensor networks, software engineering, and smart technologies. A compilation of research is needed that displays current applications of computing methodologies in the progression of global cities and how smart technologies are being utilized.
: bomboane 11-04-2021, 21:09 | : 0 |
: Practical Internet Server Configuration: Learn to Build a Fully Functional and Well-Secured Enterprise Class Internet Server
: Robert La Lau
: Apress
: 2021
: true pdf/epub
: 411
: 10.4 Mb
: English

Learn the skills to complete the full installation, configuration, and maintenance of an enterprise class internet server, no matter what Unix-like operating system you prefer. This book will rapidly guide you towards real system administration, with clear explanations along the way.
: bomboane 11-04-2021, 09:27 | : 0 |
Blockchain for 5G-Enabled IoT: The new wave for Industrial Automation: Blockchain for 5G-Enabled IoT: The new wave for Industrial Automation
: Sudeep Tanwar
: Springer
: 2021
: 629
:
: pdf (true)
: 13.3 MB

This book addresses one of the most overlooked practical, methodological, and moral questions in the journey to secure and handle the massive amount of data being generated from smart devices interactions: the integration of Blockchain with 5G-enabled IoT. After an overview, this book discusses open issues and challenges, which may hinder the growth of Blockchain technology. Then, this book presents a variety of perspectives on the most pressing questions in the field, such as: how IoT can connect billions of objects together; how the access control mechanisms in 5G-enabled industrial environment works; how to address the real-time and quality-of-service requirements for industrial applications; and how to ensure scalability and computing efficiency.
: Ingvar16 10-04-2021, 16:15 | : 0 |
The Cloud Developer Workbook: 100 Hands-on Exercises to Build Your AWS Skills: The Cloud Developer Workbook: 100 Hands-on Exercises to Build Your AWS Skills
: Ryan H. Lewis
: Independently published
: 2021
: 164
:
: pdf, azw3, epub
: 10.6 MB

Overwhelmed with learning AWS and unsure of where to start? Written specifically for software developers, The Cloud Developer Workbook contains 130+ pages with 100 hands-on exercises and tips to build your AWS cloud skills and guide you on your journey to becoming a cloud developer. Interested in taking the AWS Certified Cloud Practitioner Certification Exam? This workbook is a great study guide!
: Ingvar16 9-04-2021, 18:05 | : 0 |
: Protective Security: Creating Military-Grade Defenses for Your Digital Business
: Jim Seaman
: Apress
: 2021
: true pdf/epub
: 760
: 104.4 Mb
: English

This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization. You will know how business-critical assets are compromised: cyberattack, data breach, system outage, pandemic, natural disaster, and many more.
Rather than being compliance-concentric, this book focuses on how your business can identify the assets that are most valuable to your organization and the threat vectors associated with these assets. You will learn how to apply appropriate mitigation controls to reduce the risks within suitable tolerances.
: bomboane 9-04-2021, 08:34 | : 0 |

.. 1 2 3 4 5 6 7 8 9 10 ... 335




 MirKnig.Su  2020