|
 |
|
 |
|
|
 |
|  |
|
Название: Network Geeks: How They Built the Internet Автор: Brian E Carpenter Издательство: Springer Год: 2013 Формат: PDF, EPUB Размер: 10 Мб Язык: английский / English
The impact on modern society made by the Internet is immeasurable. Yet some questioned “why anyone would want such a thing” when the idea was first introduced. Part history, part memoir and part cultural study, Network Geeks charts the creation of the Internet and the establishment of the Internet Engineering Task Force, from the viewpoint of a self-proclaimed geek who witnessed these developments first-hand. |
Разместил: black 11-02-2019, 21:53 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Counterterrorism and Cybersecurity Автор: Newton Lee Издательство: Springer Год: 2013 Формат: PDF, EPUB Размер: 10 Мб Язык: английский / English
Imagine James Bond meets Sherlock Holmes: Counterterrorism and Cybersecurity is the sequel to Facebook Nation in the Total Information Awareness book series by Newton Lee. The book examines U.S. counterterrorism history, technologies, and strategies from a unique and thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from great thought leaders, and even the make-believe of Hollywood. Demystifying Total Information Awareness, the author expounds on the U.S. intelligence community, artificial intelligence in data mining, social media and privacy, cyber attacks and prevention, causes and cures for terrorism, and longstanding issues of war and peace. |
Разместил: black 11-02-2019, 21:48 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
 Название: Security+ Guide to Network Security Fundamentals, Third Edition Автор: Mark Ciampa Издательство: Course Technology, Cengage Learning Год: 2009 Формат: PDF Для сайта: Mirknig.su Страниц: 590 Размер: 11,58 МБ Язык: English
Now in its third edition, the best-selling SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS provides the most up-to-date industry information, reflecting the changes in security that have occurred since the most recent CompTIA Security+ objectives were created. The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam. |
Разместил: ak5812 11-02-2019, 20:58 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Malware Diffusion Models for Modern Complex Networks Автор: Vasileios Karyotis and M.H.R. Khouzani Издательство: Morgan Kaufmann Год: 2016 Формат: PDF Размер: 10 Мб Язык: английский / English
Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable devices, namely smartphones and tablets, and their increased capabilities, has propelled the intensity of malware spreading and increased its consequences in social life and the global economy, this book provides the theoretical aspect of malware dissemination, also presenting modeling approaches that describe the behavior and dynamics of malware diffusion in various types of wireless complex networks. |
Разместил: black 11-02-2019, 17:10 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Wireless Personal Communications: Simulation and Complexity Автор: Mohsen A. M. El-Bendary Издательство: Springer Год: 2018 Формат: EPUB, PDF Размер: 16 Мб Язык: английский / English
This book introduces wireless personal communications from the point of view of wireless communication system researchers. Existing sources on wireless communications put more emphasis on simulation and fundamental principles of how to build a study model. In this volume, the aim is to pass on to readers as much knowledge as is essential for completing model building of wireless communications, focusing on wireless personal area networks (WPANs). |
Разместил: black 11-02-2019, 16:32 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: IPv6 Address Planning Автор: Tom Coffeen Издательство: O'Reilly Media Год: 2014 Формат: PDF, EPUB Размер: 30 Мб Язык: английский / English
If you’re ready to join the move to IPv6, this comprehensive guide gets you started by showing you how to create an effective IPv6 address plan. In three example-driven sections—preparation, design, and maintenance—you’ll learn principles and best practices for designing, deploying, and maintaining an address plan far beyond what’s possible with IPv4 networks. |
Разместил: black 10-02-2019, 22:03 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Mobile Marketing: How Mobile Technology is Revolutionizing Marketing, Communications and Advertising Автор: Daniel Rowles Издательство: Kogan Page Год: 2017 Формат: PDF, EPUB Размер: 16 Мб Язык: английский / English
Mobile Marketing is a clear, practical guide to harnessing the mobile consumer and tackling the rising challenges of divided user attention across multiple screens at the same time. It demystifies the vast spectrum of tools and techniques now available and explains how to optimize these dynamics into an innovative and effective mobile marketing strategy. Now that website search rankings take into account mobile optimization, no serious marketer can do without a thorough understanding of mobile. |
Разместил: black 10-02-2019, 21:44 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Cisco VPN Configuration Guide Автор: Harris Andrea Издательство: CreateSpace Independent Publishing Platform Год: 2014 Формат: PDF, EPUB Размер: 22 Мб Язык: английский / English
Become an expert in Cisco VPN technologies with this practical and comprehensive configuration guide. Learn how to configure IPSEC VPNs (site-to-site, hub-and-spoke, remote access), SSL VPN, DMVPN, GRE, VTI etc. This book is packed with step-by-step configuration tutorials and real world scenarios to implement VPNs on Cisco ASA Firewalls (v8.4 and above and v9.x) and on Cisco Routers. It is filled with raw practical concepts, around 40 network diagrams to explain the scenarios, troubleshooting instructions, 20 complete configurations on actual devices and much more. Both beginners and experts will find some golden nuggets inside this practical guide. |
Разместил: black 9-02-2019, 16:40 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Bandwidth Efficient Coding Автор: John B. Anderson Издательство: Wiley Год: 2017 Формат: PDF, EPUB Размер: 11 Мб Язык: английский / English
Bandwidth Efficient Coding takes a fresh look at classical information theory and introduces a different point of view for research and development engineers and graduate students in communication engineering and wireless communication. |
Разместил: black 9-02-2019, 16:20 | Комментарии: 1 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Blockchain Basics: A Non-Technical Introduction in 25 Steps Автор: Daniel Drescher Издательство: Apress Год: 2017 Формат: PDF, EPUB Размер: 10 Мб Язык: английский / English
In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used.No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors. This book bridges the gap that exists between purely technical books about the blockchain and purely business-focused books. It does so by explaining both the technical concepts that make up the blockchain and their role in business-relevant applications. |
Разместил: black 9-02-2019, 15:52 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
br>
|