|
|
|
|
|
|
|
| |
|
Название: Fog Computing in the Internet of Things: Intelligence at the Edge Автор: Pasi Liljeberg and J?rgo-S?ren Preden Издательство: Springer Год: 2017 Формат: AZW3, EPUB, PDF Размер: 11 Мб Язык: английский / English
This book describes state-of-the-art approaches to Fog Computing, including the background of innovations achieved in recent years. Coverage includes various aspects of fog computing architectures for Internet of Things, driving reasons, variations and case studies. |
Разместил: black 8-12-2017, 15:37 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control Автор: Daniel V. Hoffman Издательство: Wiley Год: 2008 Формат: EPUB, PDF Размер: 12 Мб Язык: английский / English
This guide presents real-world hacking scenarios along with complete implementation guidance for the right NAP/NAC solution, so you can understand which solution makes the most sense based upon the most prevalent risks in your environment. Follow the actual steps hackers take to perform specific exploits, determine which security solutions will stop the exploits from happening, and learn all about the standard components of any NAP/NAC solution. |
Разместил: black 8-12-2017, 15:15 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: DBA Transformations: Building Your Career in the Transition to On-Demand Cloud Computing and Extreme Automation Автор: Michelle Malcher Издательство: Apress Год: 2018 Страниц: 125 Формат: PDF, EPUB Размер: 10 Mb Язык: English
Adapt your career as a database administrator to the changing industry. Learn where the growth and demand for DBA talent are occurring and how to enhance your skill set. Creating databases, providing access, and controlling data are no longer the focus. What matters now is managing and monitoring the systems that provide access to users of the data. |
Разместил: bhaer 8-12-2017, 10:04 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Achieving and Sustaining Secured Business Operations: An Executive’s Guide to Planning and Management Автор: Neelesh Ajmani,? Dinesh Kumar Издательство: Apress Год: 2018 Страниц: 168 Формат: PDF, EPUB Размер: 10 Mb Язык: English
Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets. |
Разместил: bhaer 8-12-2017, 09:44 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Internet Technologies for Fixed and Mobile Networks Автор: Toni Janevski Издательство: Artech House Серия: Mobile Communications ISBN: 160807921X Год: 2017 Страниц: 389 Язык: английский Формат: pdf Размер: 10.4 MB
Сближение устаревших телекоммуникаций с Интернет и интернет-технологиями - это непрерывный процесс, в результате которого сходятся телекоммуникационные и интернет-миры. Основываясь на текущей и развивающейся отраслевой практике, эта книга посвящена интернет-технологиям, в частности принципам, протоколам (IP, IPv4, IPv6, DHCP, UDP, TCP) и службам Интернета для фиксированных и мобильных сетей, включая технологии, регулирование и бизнес-аспекты. |
Разместил: Ingvar16 7-12-2017, 22:01 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Antisocial Media: Crime-watching in the Internet Age Автор: Mark A. Wood Издательство: Palgrave Macmillan Год: 2017 Формат: AZW3, EPUB, PDF Размер: 5 Мб Язык: английский / English
This book provides a cutting-edge introduction to Internet-facilitated crime-watching and examines how social media have shifted the landscape for producing, distributing, and consuming footage of crime. In this thought-provoking work, Mark Wood examines the phenomenon of antisocial media: participatory online domains where footage of crime is aggregated, sympathetically curated, and consumed as entertainment. |
Разместил: black 7-12-2017, 20:28 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Women in Security: Changing the Face of Technology and Innovation Автор: Debra A. Christofferson Издательство: Springer Год: 2017 Формат: AZW3, EPUB, PDF Размер: 9 Мб Язык: английский / English
This volume examines core areas of development in security, emphasizing the pivotal contributions of women to the field’s evolution. The author first covers a broad spectrum of key topics, including how security is created, where innovation occurs, what the underpinnings are, and who supports it and how. |
Разместил: black 7-12-2017, 20:05 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Как уберечь себя от действий мошенников. Мануал. Как избежать мошенничества Автор: Максим Клим Издательство: Издательские решения Год: 2017 Страниц: 19, 7 цв. ил. Язык: Русский Формат: rtf, pdf Размер: 11,4 Mb
Подробное пособие, рекомендации, размышления о том, как обезопасить себя от мошенников и обмана. Каждому хоть один раз в жизни приходилось быть обманутым мошенниками. Будь то цыгане или преступники в Интернете. |
Разместил: yunik77 7-12-2017, 18:43 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Hacking VoIP: Protocols, Attacks, and Countermeasures Автор: Himanshu Dwivedi Издательство: No Starch Press Год: 2008 Формат: pdf, epub Страниц: 220 Размер: 5 мб (pdf), 5,4 мб (epub) Язык: английский
Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information. Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook. |
Разместил: stalinoslav 6-12-2017, 08:06 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Getting Started with Nano Server (+code) Автор: Charbel Nemnom Издательство: Packt Publishing Год: 2017 Страниц: 406 Формат: True PDF, EPUB, MOBI Размер: 12 Mb Язык: English
Remain highly competitive in the server and VM market by gaining the practical skills needed to operate Nano Server Nano Server allows developers and operations teams to work closely together and use containers that package applications so that the entire platform works as one. The aim of Nano Server is to help applications run the way they are intended to. It can be used to run and deploy infrastructures (acting as a compute host, storage host, container, or VM guest operating system) without consuming significant resources. Although Nano Server isn't intended to replace Server 2016 or 2012 R2, it will be an attractive choice for developers and IT teams. |
Разместил: bhaer 5-12-2017, 18:52 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|