|
|
|
|
|
|
|
| |
|
Название: Fundamentals of Computer Networks Автор: Matthew N.O. Sadiku, Cajetan M. Akujuobi Издательство: Springer, Humana Press Год: 2022 Страниц: 203 Язык: английский Формат: pdf (true), epub Размер: 53.5 MB
This textbook presents computer networks to electrical and computer engineering students in a manner that is clearer, more interesting, and easier to understand than other texts. All principles are presented in a lucid, logical, step-by-step manner. As much as possible, the authors avoid wordiness and giving too much detail that could hide concepts and impede overall understanding of the material. Ten review questions in the form of multiple-choice objective items are provided at the end of each chapter with answers. The review questions are intended to cover the little “tricks” which the examples and end-of-chapter problems may not cover. They serve as a self-test device and help students determine how well they have mastered the chapter. |
Разместил: Ingvar16 2-09-2022, 14:47 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Blockchain for IoT Автор: Debarka Mukhopadhyay, Siddhartha Bhattacharyya, Balachandran Krishnan Издательство: CRC Press Год: 2023 Страниц: 241 Язык: английский Формат: pdf (true) Размер: 11.1 MB
Blockchain for IoT provides the basic concepts of Blockchain technology and its applications to varied domains catering to socio-technical fields. It also introduces intelligent Blockchain platforms by way of infusing elements of computational intelligence into Blockchain technology. With the help of an interdisciplinary approach, it includes insights into real-life IoT applications to enable the readers to assimilate the concepts with ease. This book provides a balanced approach between theoretical understanding and practical applications. |
Разместил: Ingvar16 1-09-2022, 23:08 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Blockchain Consensus An Introduction to Classical, Blockchain, and Quantum Consensus Protocols Автор: Imran Bashir Издательство: Apress Год: 2022 Формат: True PDF Страниц: 457 Размер: 10 Mb Язык: English
This book is your comprehensive guide to understanding Blockchain and Blockchain consensus algorithms. It covers distributed systems, distributed consensus, and relevant system models. And you'll explore how classical and modern consensus algorithms work. The book also covers quantum consensus and explains the role that quantum computing plays in distributed systems. Consensus protocols allow participants in distributed systems to agree on a common value, despite faults. It's a fundamentally important construct in distributed systems. As a result of rigorous and ground-breaking research over the last four decades, many consensus mechanisms have been developed and are used in the industry today. However, with the advent of Blockchain technology, a renewed interest has arisen in this area, resulting in more research and innovation. |
Разместил: vitvikvas 22-08-2022, 06:52 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Серия "Системный администратор" в 23 книгах Автор(ы): разные Издательство: БХВ-Петербург Год: 2005-2022 Страниц: 1000+ Формат: PDF Размер: 606 Мб Язык: русский
Серия книг "Системный администратор" - это источник знаний, необходимых для проектирования, внедрения и сопровождения вычислительных сетей, операционных и информационных систем и дающих возможность обеспечить их информационную безопасность и квалифицированное администрирование. Для системных администраторов, IT-менеджеров, инженеров по техническому обеспечению.
|
Разместил: MIHAIL62 19-08-2022, 13:53 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Network Security: Private Communications in a Public World Автор: Kaufman C., Perlman E., Speciner M., Perlner R. Издательство: Addison-Wesley Год: 2023 Формат: pdf, epub Страниц: 678 Размер: 15 mb Язык: Английский
Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. |
Разместил: na5ballov 19-08-2022, 13:05 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Компьютерные сети. Часть 3. Стандарты и протоколы Автор(ы): Бабаев С.И. и др. Издательство: КУРС Год: 2018 Страниц: 176 Формат: PDF Размер: 11 Мб Язык: русский
Данный учебник предназначен для студентов (бакалавров, магистров), аспирантов и специалистов, которым необходимо получить базовые практические навыки в проектировании и настройке компьютерных сетей, понять особенности традиционных и перспективных технологий локальных и глобальных сетей, изучить способы создания крупных коммутируемых сетей и управления такими сетями.
|
Разместил: MIHAIL62 7-08-2022, 04:33 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: AWS Security Автор: Dylan Shields Издательство: Manning Publications Год: 2022 Формат: True PDF Страниц: 311 Размер: 22 Mb Язык: English
AWS Security covers best practices for access policies, data protection, auditing, continuous monitoring, and incident response. To create secure applications and infrastructure on AWS, you need to understand the tools and features the platform provides and learn new approaches to configuring and managing them. AWS Security provides comprehensive coverage of the key tools and concepts you can use to defend AWS-based systems. AWS Security covers best practices for access policies, data protection, auditing, continuous monitoring, and incident response. Through well-documented examples and procedures, you’ll explore several deliberately insecure applications, learning the exploits and vulnerabilities commonly used to attack them and the security practices to counter those attacks. With this practical primer, you’ll be well prepared to evaluate your system’s security, detect threats, and respond with confidence. |
Разместил: vitvikvas 4-08-2022, 11:22 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Coding Theory - Algorithms, Architectures, and Applications Автор: Andre Neubauer, Jurgen Freudenberger, Volker Kuhn Издательство: Wiley-Interscience Год: 2007 Формат: pdf Страниц: 355 Размер: 10,6 МБ Язык: English
One of the most important key technologies for digital communication systems as well as storage media is coding theory. It provides a means to transmit information across time and space over noisy and unreliable communication channels. Coding Theory: Algorithms, Architectures and Applications provides a concise overview of channel coding theory and practice, as well as the accompanying signal processing architectures. The book is unique in presenting algorithms, architectures, and applications of coding theory in a unified framework. It covers the basics of coding theory before moving on to discuss algebraic linear block and cyclic codes, turbo codes and low density parity check codes and space-time codes. Coding Theory provides algorithms and architectures used for implementing coding and decoding strategies as well as coding schemes used in practice especially in communication systems.
|
Разместил: vikCAT 31-07-2022, 15:42 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cyberpredators and Their Prey Автор: Lauren R. Shapiro Издательство: CRC Press Год: 2023 Формат: True PDF Страниц: 383 Размер: 10 Mb Язык: English
The online environment has emerged as a continuous and unfettered source of interpersonal criminal activity beyond physical boundaries. Cyberpredators commit their crimes by employing the Internet and online services—social network platforms, online groups and organizations, smart phone apps, bulletin board systems, online forums, websites, internet relay chat channels—to locate and harm victims of all ages through attacking, exploiting, humiliating, bullying, harassing, threatening, defrauding, and exhorting. Cyberpredators and Their Prey describes non-sexual and sexual interpersonal crimes—online romance scam, swatting, trolling, stalking, bullying, harassment, minor sexting, sexual trafficking, child sexual abuse material, sextortion, and image-based sexual abuse offenses. Each chapter contains: crime definition and relevant issues; typical cyberpredator, motives, and methods; typical victims and behaviors that make them targets; current criminal laws for prosecuting cybercrimes and assessment of their applicability and effectiveness as deterrents; the crime’s impact on individual victims and society in general; and cybersecurity prevention and intervention strategies. |
Разместил: vitvikvas 27-07-2022, 04:53 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Let's Get IoT-fied!: 30 IoT Projects for All Levels Автор: Anudeep Juluru, Shriram K. Vasudevan, T. S. Murugesh Издательство: CRC Press Год: 2022 Формат: True PDF Страниц: 553 Размер: 15,8 Mb Язык: English
Internet of Things (IoT) stands acclaimed as a widespread area of research and has definitely enticed the interests of almost the entire globe. IoT appears to be the present as well as the future technology. This book attempts to inspire readers to explore and become accustomed to IoT. Presented in a lucid and eloquent way, this book adopts a clear and crisp approach to impart the basics as expeditiously as possible. It kicks off with the very fundamentals and then seamlessly advances in such a way that the step-by-step unique approach, connection layout, and the verified codes provided for every project can enhance the intuitive learning process and will get you onboard to the world of product building. We can assure that you will be definitely raring to start developing your own IoT solutions and to get yourself completely lost in the charm of IoT. |
Разместил: vitvikvas 26-07-2022, 10:46 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|