" "



:





.. 1 ... 6 7 8 9 10 11 12 13 14 ... 388

: GNU/Linux
: ..
: X-epyp
: 2010 - 2- ., . .
C: 559
: pdf
: 13
:

GNU/Linux. - GNU/Linux, : Bash, , , , GNU/ Linux. , .
: rivasss 10-12-2021, 07:08 | : 0 |
Digitalization of Higher Education using Cloud Computing: Implications, Risk, and Challenges: Digitalization of Higher Education using Cloud Computing: Implications, Risk, and Challenges
: S. L. Gupta, Nawal Kishor, Niraj Mishra
: CRC Press
: Chapman & Hall/ CRC Cloud Computing for Society 5.0
: 2022
: 243
:
: pdf (true)
: 17.8 MB

Digitalization of Higher Education using Cloud Computing: Implications, Risk, and Challenges provides an insight into the latest technology and tools being used to explore learning in Higher Educational Institutions (HEIs). Cloud computing, being an up-and-coming technology, integrates with academia and industry, thereby enhancing the quality of education. The opportunities and challenges faced by HEIs in recent times due to technological disruptions have forced both academia and industry to realign their strategies for survival and growth. With the acceleration of cloud computing in higher education, it has now become imperative for educators to constantly upskill and reskill in order to meet the requirements of the future of work, particularly in the digital age.
: Ingvar16 9-12-2021, 16:48 | : 0 |
Vehicular Communications for Smart Cars: Protocols, Applications and Security Concerns: Vehicular Communications for Smart Cars: Protocols, Applications and Security Concerns
: Niaz Chowdhury, Lewis Mackenzie
: CRC Press
: 2022
: 216
:
: pdf (true)
: 17.1 MB

This book comprehensively covers a wide range of topics from the smart transportation domain. It discusses protocols, applications, and security concerns in various vehicular networks using examples and easy-to-understand figures. The book's first four chapters focus on vehicular network protocols and applications, while the remaining four chapters incorporate security, trust, and privacy issues with examples from real-life cases. The book concludes with a vision of what to expect in the near future and will be an invaluable resource for anybody interested in this nascent technology and its variegated applications. A Vehicle to Vehicle (V2V) communication system can offer a wide range of powerful applications to improve the driving experience. The Internet of Things (IoT) is an outstanding evolution that enables communication between numerous devices through sensors, actuators, embedded systems, and various other technologies via the Internet.
: Ingvar16 9-12-2021, 15:39 | : 0 |
: Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks
: Gunikhan Sonowal
: Apress
: 2022
: true pdf/epub
: 230
: 16.8 Mb
: English

Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.
: bomboane 9-12-2021, 02:58 | : 0 |
Artificial Intelligence, Cybersecurity and Cyber Defense, Volume 2: Artificial Intelligence, Cybersecurity and Cyber Defense, Volume 2
: Daniel Ventre
: Wiley, ISTE
: 2020
: 272
:
: epub
: 10.2 MB

The aim of the book is to analyse and understand the impacts of Artificial Intelligence (AI) in the fields of national security and defense; to identify the political, geopolitical, strategic issues of AI; to analyse its place in conflicts and cyberconflicts, and more generally in the various forms of violence; to explain the appropriation of Artificial Intelligence by military organizations, but also law enforcement agencies and the police; to discuss the questions that the development of Artificial Intelligence and its use raise in armies, police, intelligence agencies, at the tactical, operational and strategic levels.
: Ingvar16 8-12-2021, 17:05 | : 0 |
Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications: Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications
: Ali Ismail Awad, Jemal Abawajy
: Wiley-IEEE Press
: 2022
: 339
:
: pdf (true)
: 10.2 MB

Provides the authoritative and up-to-date information required for securing IoT architecture and applications. The vast amount of data generated by the Internet of Things (IoT) has made information and cyber security vital for not only personal privacy, but also for the sustainability of the IoT itself. Security and Privacy in the Internet of Things brings together high-quality research on IoT security models, architectures, techniques, and application domains. This concise yet comprehensive volume explores state-of-the-art mitigations in IoT security while addressing important security and privacy challenges across different IoT layers.
: Ingvar16 7-12-2021, 17:40 | : 0 |
: Kafka Up and Running for Network DevOps: Set Your Network Data in Motion
: Eric Chou
: Leanpub
: 2021
: ePUB, PDF
: 153
: 10 Mb
: English

Today's network is about agility, automation, and continuous improvement. In Kafka Up and Running for Network DevOps, we will be on a journey to learn and set up the hugely popular Apache Kafka data messaging system. Kafka is unique in its principle to treat network data as a continuous flow of information that can adapt to the ever-changing business requirements. Whether you need a system to aggregate log messages, collect metrics, or something else, Kafka can be the reliable, highly redundant system you want.
: vitvikvas 7-12-2021, 06:50 | : 0 |
Key 5G Physical Layer Technologies: Enabling Mobile and Fixed Wireless Access, 2nd Edition: Key 5G Physical Layer Technologies: Enabling Mobile and Fixed Wireless Access, 2nd Edition
: Douglas H. Morais
: Springer
: 2022
: 337
:
: pdf (true), epub
: 27.1 MB

This second edition is an update of the first publication. Material in the first edition addressed mainly the key physical layer technologies associated with 3GPP release 15, the first release to support 5G. This edition adds descriptions of some of the technological advancements supported in release 16, including integrated access and backhaul (IAB), sidelink communication, NR positioning, operation in unlicensed bands, and multiple transmission points transmission. It also expands upon some of the original material. Finally, to make the book more pedagogically applicable, problems have been added at the end of those chapters where the material lends itself to associated meaningful computational and/or descriptive problems.
: Ingvar16 6-12-2021, 20:20 | : 0 |
: Stability Analysis of Neural Networks
: Grienggrai Rajchakit, Praveen Agarwal, Sriraman Ramalingam
: Springer
: 2021
: PDF
: 415
: 10 Mb
: English

This book discusses recent research on the stability of various neural networks with constrained signals. It investigates stability problems for delayed dynamical systems where the main purpose of the research is to reduce the conservativeness of the stability criteria. The book mainly focuses on the qualitative stability analysis of continuous-time as well as discrete-time neural networks with delays by presenting the theoretical development and real-life applications in these research areas. The discussed stability concept is in the sense of Lyapunov, and, naturally, the proof method is based on the Lyapunov stability theory. The present book will serve as a guide to enable the reader in pursuing the study of further topics in greater depth and is a valuable reference for young researcher and scientists.
: vitvikvas 6-12-2021, 15:31 | : 0 |
Cyber Forensics : Examining Emerging and Hybrid Technologies: Cyber Forensics : Examining Emerging and Hybrid Technologies
: Albert J. Marcella
: CRC Press
: 2022
: 382
:
: pdf (true)
: 25.4 MB

Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. Written by professionals responsible for routinely performing forensic investigations, presenting legal arguments and evidence in court, along with information security, privacy, and information technology (IT) audit professionals, this book examines the role which cyber forensics plays in such critical business areas as the Internet of Things (IoT); cloud computing; risk mitigation and management; fraud; operational technologies and Supervisory Control and Data Acquisition (SCADA) systems; mobile technologies; and emerging fields, such as unmanned aircraft systems and social network forensics.
: Ingvar16 6-12-2021, 12:23 | : 0 |

.. 1 ... 6 7 8 9 10 11 12 13 14 ... 388




 MirKnig.Su  2021