|
|
|
|
|
|
|
| |
|
Название: Encyclopedia of Criminal Activities and the Deep Web Автор: Mehdi Khosrow-Pour Издательство: IGI Global Год: 2020 Формат: EPUB, PDF Размер: 74 Мб Язык: английский / English
As society continues to rely heavily on technological tools for facilitating business, e-commerce, banking, and communication, among other applications, there has been a significant rise in criminals seeking to exploit these tools for their nefarious gain. Countries all over the world are seeing substantial increases in identity theft and cyberattacks, as well as illicit transactions, including drug trafficking and human trafficking, being made through the dark web internet. Sex offenders and murderers explore unconventional methods of finding and contacting their victims through Facebook, Instagram, popular dating sites, etc., while pedophiles rely on these channels to obtain information and photographs of children, which are shared on hidden community sites. As criminals continue to harness technological advancements that are outpacing legal and ethical standards, law enforcement and government officials are faced with the challenge of devising new and alternative strategies to identify and apprehend criminals to preserve the safety of society. |
Разместил: black 12-12-2020, 20:51 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Artificial Intelligence Paradigms for Smart Cyber-Physical Systems Автор: Ashish Kumar Luhach, Atilla Elci Издательство: IGI Global Год: 2021 Формат: PDF Страниц: 412 Размер: 14.62 МБ Язык: English
Cyber-physical systems (CPS) have emerged as a unifying name for systems where cyber parts (i.e., the computing and communication parts) and physical parts are tightly integrated, both in design and during operation. Such systems use computations and communication deeply embedded in and interacting with human physical processes as well as augmenting existing and adding new capabilities. As such, CPS is an integration of computation, networking, and physical processes. Embedded computers and networks monitor and control the physical processes, with feedback loops where physical processes affect computations and vice versa. The economic and societal potential of such systems is vastly greater than what has been realized, and major investments are being made worldwide to develop the technology. |
Разместил: ak5812 11-12-2020, 16:10 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Сети передачи информации АСУ Автор: Суздалев А.В. Издательство: М.: Радио и связь Год: 1983 Формат: djvu Страниц: 155 Размер: 10,2 Мб Язык: Русский
Излагаются вопросы построения, функционирования и системного проектирования сетей передачи информации АСУ. Рассматриваются задачи программного и математического обеспечения сетей, а также методы и алгоритмы технико-экономической оптимизации параметров. Приводимые в книге методы иллюстрируются практическими расчетами.
|
Разместил: oksanavalera 11-12-2020, 11:14 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Handbook of Research on the Internet of Things Applications in Robotics and Automation Автор: Rajesh Singh, Anita Gehlot, Vishal Jain Издательство: IGI Global Год: 2020 Страниц: 450 Язык: английский Формат: pdf (true) Размер: 20.4 MB
With near-universal internet access and ever-advancing electronic devices, the ability to facilitate interactions between various hardware and software provides endless possibilities. Though internet of things (IoT) technology is becoming more popular among individual users and companies, more potential applications of this technology are being sought every day. There is a need for studies and reviews that discuss the methodologies, concepts, and possible problems of a technology that requires little or no human interaction between systems. The mobile robotics industry is related to creating mobile robots that can move around in physical environments. The sensor-based obstacle-avoiding robots are designed using ultrasonic sensors and Arduino microcontrollers. Bluetooth-based obstacle-avoiding robots have been designed using Arduino mega and Bluetooth module and an Android application. IoT-based obstacle-avoiding robots can be designed in three different ways, using ethernet shield, node MCU, or Raspberry Pi. |
Разместил: Ingvar16 10-12-2020, 20:07 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Handbook of Research on Cloud Computing and Big Data Applications in IoT Автор: B.B. Gupta, Dharma P. Agrawal Издательство: IGI Global Год: 2019 Страниц: 637 Язык: английский Формат: pdf (true) Размер: 22.9 MB
Today, cloud computing, big data, and the internet of things (IoT) are becoming indubitable parts of modern information and communication systems. They cover not only information and communication technology but also all types of systems in society including within the realms of business, finance, industry, manufacturing, and management. Therefore, it is critical to remain up-to-date on the latest advancements and applications, as well as current issues and challenges. The Handbook of Research on Cloud Computing and Big Data Applications in IoT is a pivotal reference source that provides relevant theoretical frameworks and the latest empirical research findings on principles, challenges, and applications of cloud computing, big data, and IoT. While highlighting topics such as fog computing, language interaction, and scheduling algorithms, this publication is ideally designed for software developers, computer engineers, scientists, professionals, academicians, researchers, and students. |
Разместил: Ingvar16 9-12-2020, 22:29 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Fog, Edge and Pervasive Computing in Intelligent IoT Driven Applications Автор: Deepak Gupta (Editor), Aditya Khamparia (Editor) Издательство: Wiley Год: 2021 Формат: True PDF Страниц: 444 Размер: 10.3 Mb Язык: English
A practical guide to the design, implementation, evaluation, and deployment of emerging technologies for intelligent IoT applications With the rapid development in artificially intelligent and hybrid technologies, IoT, edge, fog-driven, and pervasive computing techniques are becoming important parts of our daily lives. This book focuses on recent advances, roles, and benefits of these technologies, describing the latest intelligent systems from a practical point of view. |
Разместил: bomboane 8-12-2020, 18:37 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: IoT Architectures, Models, and Platforms for Smart City Applications Автор: Bhawani Shankar Chowdhry Издательство: IGI Global Год: 2020 Формат: True PDF Страниц: 308 Размер: 10 Mb Язык: English
Developing countries are persistently looking for efficient and cost-effective methods for transforming their communities into smart cities. Unfortunately, energy crises have increased in these regions due to a lack of awareness and proper utilization of technological methods. These communities must explore and implement innovative solutions in order to enhance citizen enrollment, quality of government, and city intelligence. |
Разместил: bomboane 8-12-2020, 11:41 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention Автор: Abdulmohsen Almalawi, Zahir Tari Издательство: Wiley Год: 2021 Страниц: 212 Язык: английский Формат: pdf (true) Размер: 10.1 MB
Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems. Cyber-attacks on SCADA systems?the control system architecture that uses computers, networked data communications, and graphical user interfaces for high-level process supervisory management?can lead to costly financial consequences or even result in loss of life. Minimizing potential risks and responding to malicious actions requires innovative approaches for monitoring SCADA systems and protecting them from targeted attacks. SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention is designed to help security and networking professionals develop and deploy accurate and effective Intrusion Detection Systems (IDS) for SCADA systems that leverage autonomous machine learning. |
Разместил: Ingvar16 7-12-2020, 22:06 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Pro Google Cloud Automation Автор: Sabharwal, Navin, Pandey, Piyush Издательство: Apress Год: 2021 Формат: true pdf/epub Страниц: 318 Размер: 40 Mb Язык: English
Discover the methodologies and best practices for getting started with Google cloud automation services including Google Cloud Deployment Manager, Spinnaker, Tekton, and Jenkins to automate deployment of cloud infrastructure and applications.
The book begins with an introduction to Google cloud services and takes you through the various platforms available to do automation on the GCP platform. You will do hands-on exercises and see best practices for using Google Cloud Deployment Manager, Spinnaker, Tekton, and Jenkins. You’ll cover the automation aspects of the Google Cloud Platform holistically using native and upcoming open source technologies.
The authors cover the entire spectrum of automation from cloud infrastructure to application deployment and tie everything together in a release pipeline using Jenkins. Pro Google Cloud Automation provides in-depth guidance on automation and deployment of microservices-based applications running on the Kubernetes platform. It provides sample code and best practice guidance for developers and architects for their automation projects on the Google Cloud Platform. |
Разместил: bomboane 7-12-2020, 16:14 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Hands-On Ethical Hacking and Network Defense Автор: Michael T. Simpson, Kent Backman, James E. Corley Издательство: Course Technology, Cengage Learning Год: 2013 Формат: PDF Страниц: 464 Размер: 11,69 МБ Язык: English
It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who understand how attackers compromise networks is growing right along with the threat. Government agencies and private companies rely on "ethical hackers"--professional security testers--to put their networks to the test and discover vulnerabilities before attackers do. |
Разместил: ak5812 6-12-2020, 21:46 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|