|
 |
|
 |
|
|
 |
|  |
|
Название: Cyber Operations and International Law Автор: Fr. Delerue Издательство: Cambridge University Press Год: 2020 Формат: PDF Страниц: 514 Размер: 10 Mb Язык: English
This book offers a comprehensive analysis of the international law applicable to cyber operations, including a systematic examination of attribution, lawfulness and remedies. It demonstrates the importance of countermeasures as a form of remedies and also shows the limits of international law, highlighting its limits in resolving issues related to cyber operations. There are several situations in which international law leaves the victim State of cyber operations helpless. Two main streams of limits are identified. First, in the case of cyber operations conducted by non-state actors on the behalf of a State, new technologies offer various ways to coordinate cyber operations without a high level of organization. Second, the law of State responsibility offers a range of solutions to respond to cyber operations and seek reparation, but it does not provide an answer in every case and it cannot solve the problem related to technical capabilities of the victim. |
Разместил: vitvikvas 6-03-2020, 19:41 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Driving Networked Service Productivity (Markt- und Unternehmensentwicklung Markets and Organisations) Автор: Christofer F. Daiberl Издательство: Springer Год: 2020 Формат: True PDF Страниц: 264 Размер: 12.6 Mb Язык: English
Christofer F. Daiberl explores how to enhance the productivity of services delivered by a network of co-providers. Harnessing empirical insights and synthesizing contributions from service design, information systems, and engineering, the author develops a systematic productivity improvement technique. The technique supports practitioners to iteratively discover and seize opportunities to enhance productivity for their own organization, customers, and relevant co-providers. Reflecting on the overall results, five general design principles are proposed that support the development of new artifacts fostering truly productive services in a networked world. |
Разместил: bomboane 2-03-2020, 20:19 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: CCNA: Simple and Effective Strategies to Learn Routing and Switching Essentials Автор: Ethan Thorpe Издательство: Amazon.com Services LLC Год: 2020 Формат: epub Страниц: 138 Размер: 11.6 Mb Язык: English
The CCNA Simple and Effective Strategies to learn Routing and Switching Essentials book is for readers who are interested in jobs in the ICT industry or who expect to meet the grassroots requirements to obtain more specialized ICT skills. This book covers topics in the field of networks in a broad and integrated way, from basic aspects to advanced applications and services, while providing practical experience with a hands on approach. The book describes the architecture, components, and operations of routers and switches in a network. |
Разместил: bomboane 2-03-2020, 19:29 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Special Topics in Multimedia, IoT and Web Technologies Автор: Valter Roesler (Editor), Eduardo Barr?re (Editor), Roberto Willrich (Editor) Издательство: Springer Год: 2020 Формат: True PDF Страниц: 274 Размер: 10.5 Mb Язык: English
This book presents a set of recent advances that involve the areas of multimedia, IoT, and web technologies. These advances incorporate aspects of clouds, artificial intelligence, data analysis, user experience, and games. In this context, the work will bring the reader the opportunity to understand new possibilities of use and research in these areas. We think that this book is suitable for students (postgraduates and undergraduates) and lecturers on these specific topics. Professionals can also benefit from the book since some chapters work with practical aspects relevant to the industry. |
Разместил: bomboane 2-03-2020, 11:34 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Networking All-in-One For Dummies, 7 edition Автор: Doug Lowe Издательство: For Dummies Год: 2018 Формат: epub, true pdf Страниц: 984 Размер: 24.6 Mb, 28.1 Mb Язык: English
Becoming a master of networking has never been easier Whether you're in charge of a small network or a large network, Networking All-in-One is full of the information you’ll need to set up a network and keep it functioning. Fully updated to capture the latest Windows 10 releases through Spring 2018, this is the comprehensive guide to setting up, managing, and securing a successful network. |
Разместил: bomboane 1-03-2020, 17:34 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Secure Quantum Network Coding Theory Автор: Secure Quantum Network Coding Theory Издательство: Springer Год: 2020 Формат: true pdf/epub Страниц: 283 Размер: 17.6 Mb Язык: English
This is the first book on secure quantum network coding, which integrates quantum cryptography into quantum communication. It summarizes the main research findings on quantum network coding, while also systematically introducing readers to secure quantum network coding schemes. With regard to coding methods, coding models and coding security, the book subsequently provides a series of quantum network coding schemes based on the integration of quantum cryptography into quantum communication. |
Разместил: bomboane 1-03-2020, 10:07 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: CompTIA Security+: Study Guide for the CompTIA Security+ Certification (Exam SY0-501) Автор: Samuel Foster Издательство: Amazon.com Services LLC Год: 2020 Страниц: 138 Язык: английский Формат: pdf (conv), epub Размер: 10.1 MB
Have you wanted to make progress in your cyber security career, but you always feel overwhelmed by the different options of security certifications so much that you don’t know which one is the best for you, which one will land you the best job or the one that will assist you in moving forward? If you’ve answered YES, then keep reading... |
Разместил: Ingvar16 1-03-2020, 09:48 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Machine Learning with Neural Networks: An In-depth Visual Introduction with Python: Make Your Own Neural Network in Python: A Simple Guide on Machine Learning with Neural Networks Автор: Michael Taylor, Mark Koning Издательство: Blue Windmill Media Год: 2017 Формат: epub, azw3, pdf Страниц: 248 Размер: 16,2 mb Язык: English
A step-by-step visual journey through the mathematics of neural networks, and making your own using Python and Tensorflow. |
Разместил: bomboane 1-03-2020, 08:45 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: The Math of Neural Networks Автор: Michael Taylor Издательство: Independently published Год: 2017 ISBN: 9781549893643 Формат: azw3/pdf(conv.) Страниц: 167 Размер: 11,7 mb Язык: English
This book is designed as a visual introduction to the math of neural networks. |
Разместил: bomboane 1-03-2020, 08:44 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting (Advances in Information Security) Автор: Saed Alrabaee, Mourad Debbabi, Paria Shirani Издательство: Springer Год: 2020 Формат: true pdf/epub Страниц: 247 Размер: 20.9 Mb Язык: English
This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough understanding of binary code analysis and several software fingerprinting techniques for cybersecurity applications, such as malware detection, vulnerability analysis, and digital forensics. More specifically, it starts with an overview of binary code analysis and its challenges, and then discusses the existing state-of-the-art approaches and their cybersecurity applications. Furthermore, it discusses and details a set of practical techniques for compiler provenance extraction, library function identification, function fingerprinting, code reuse detection, free open-source software identification, vulnerability search, and authorship attribution. It also illustrates several case studies to demonstrate the efficiency, scalability and accuracy of the above-mentioned proposed techniques and tools. |
Разместил: bomboane 29-02-2020, 18:55 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
br>
|