|
 |
|
 |
|
|
 |
|  |
|
 Название: 5G Networks: Fundamental Requirements, Enabling Technologies, and Operations Management Автор: Anwer Al-Dulaimi Издательство: Wiley-IEEE Press Год: 2018 Страниц: 784 Формат: True PDF Размер: 296 Mb Язык: English
A reliable and focused treatment of the emergent technology of fifth generation (5G) networks This book provides an understanding of the most recent developments in 5G, from both theoretical and industrial perspectives. It identifies and discusses technical challenges and recent results related to improving capacity and spectral efficiency on the radio interface side, and operations management on the core network side. It covers both existing network technologies and those currently in development in three major areas of 5G: spectrum extension, spatial spectrum utilization, and core network and network topology management. It explores new spectrum opportunities; the capability of radio access technology; and the operation of network infrastructure and heterogeneous QoE provisioning. |
Разместил: bhaer 30-09-2018, 13:38 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Популярный самоучитель работы в Интернете Автор: Геннадий Кондратьев Издательство: Питер Год выпуска: 2005 Страниц: 345 Формат: pdf Размер: 40,6 мб Язык: Русский
Книга Геннадия Кондратьева - это самый веселый на свете самоучитель по Интернету. Электронная почта, браузеры, чаты, ICQ, тонкости и хитрости работы в Сети - все к вашим услугам, смешное, занятное, снабженное карикатурами и шутками. Хватайте книгу в охапку, и вперед - на просторы глобальных сетей! |
Разместил: Yran 29-09-2018, 13:23 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Remote Usability Testing Автор: Inge De Bleecker, Rebecca Okoroji Издательство: Packt Publishing Год: 2018 ISBN: 1788999045 / 9781788999045 Формат: epub,pdf Страниц: 202 Размер: 10,2 mb Язык: English
Actionable insights in user behavior across geographies and time zones |
Разместил: daromir 29-09-2018, 09:22 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: IP-телефония не для профессионалов Автор: Кучников Т.В. Жанр: IP-телефония Издательство: ИДДК Год выпуска: 2006 Страниц: 100 Язык: Русский Формат: iso Размер: 24 Mb
С помощью этого диска Вы получите ответы практически на все вопросы по поводу достоинств и недостатков различных видов IP-телефонии, а также узнаете, как бесплатно позвонить в различные уголки мира. |
Разместил: gol8425 27-09-2018, 17:01 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
 Автор: James F. Kurose, Keith W. Ross Название: Computer Networking: A Top-Down Approach, 6th Edition Издательство: Pearson Год: 2012 ISBN: 9780132856201 Язык: English Формат: pdf Размер: 11,8 mb Страниц: 864
Computer Networking continues with an early emphasis on application-layer paradigms and application programming interfaces (the top layer), encouraging a hands-on experience with protocols and networking concepts, before working down the protocol stack to more abstract layers. |
Разместил: daromir 27-09-2018, 14:21 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, 2nd Edition Автор: Albert Marcella, Doug Menendez Издательство: Auerbach Publications Год: 2007 ISBN: 0849383285 / 9780849383281 Серия: Information Security Формат: pdf Страниц: 528 Размер: 11,1 mb Язык: English
Designed as an introduction and overview to the field, Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition integrates theory and practice to present the policies, procedures, methodologies, and legal ramifications and implications of a cyber forensic investigation. |
Разместил: daromir 27-09-2018, 13:41 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Cloud Ethical Hacking: Use Kali Linux on Amazon AWS (Видеокурс) Автор: FeltSecure Labs Издательство: Udemy Год: 2018 Видео: H264 MP4 AVC, 1280x720 Аудио: AAC 48000 KHz 2 Ch Продолжительность: 03:13:00 Размер: 569,7 mb Язык: English
The only course you need to start running Kali Linux and ethical hacking tasks on Amazon cloud! |
Разместил: daromir 27-09-2018, 11:44 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Security for Multihop Wireless Networks Автор: Shafiullah Khan and Jaime Lloret Mauri Издательство: CRC Press Год: 2014 Формат: PDF Размер: 10 Мб Язык: английский / English
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks. |
Разместил: black 27-09-2018, 11:30 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Cryptocurrency Foundations (Видеокурс) Автор: Jonathan Reichental Издательство: Lynda Год: 2018 Видео: H264 MP4 AVC, 12080x720 Аудио: AAC 48000 KHz 2 Ch Продолжительность: 01:03:00 Размер: 773 mb Язык: English
This short course is for anyone who wants to understand the basics of how cryptocurrencies are created, traded, and mined. |
Разместил: daromir 27-09-2018, 11:10 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
 Название: Network Intrusion Detection using Deep Learning: A Feature Learning Approach Автор: Kwangjo Kim Издательство: Springer Год: 2018 Страниц: 79 Формат: PDF, EPUB Размер: 10 Mb Язык: English
This book presents recent advances in intrusion detection systems (IDSs) using state-of-the-art deep learning methods. It also provides a systematic overview of classical machine learning and the latest developments in deep learning. In particular, it discusses deep learning applications in IDSs in different classes: generative, discriminative, and adversarial networks. Moreover, it compares various deep learning-based IDSs based on benchmarking datasets. The book also proposes two novel feature learning models: deep feature extraction and selection (D-FES) and fully unsupervised IDS. Further challenges and research directions are presented at the end of the book. |
Разместил: bhaer 27-09-2018, 09:07 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
br>
|