|
 |
|
 |
|
|
 |
|  |
|
Название: Cloud Computing Technology Автор: Huawei Technologies Co., Ltd. Издательство: Springer Год: 2023 Страниц: 389 Язык: английский Формат: pdf (true) Размер: 10.2 MB
This book introduces cloud computing and related technologies from the concept, technology, and architecture of cloud computing, combined with typical application cases of cloud; provides students with a more complete knowledge framework in the field of cloud computing; and lays the foundation for future research, development, and further study in cloud computing, Big Data, and other related fields. As the world's leading provider of ICT (information and communication technology) infrastructure and intelligence terminals, Huawei's products are already available in a number of areas, including connectivity, security, wireless, storage, cloud computing, intelligent computing, and Artificial Intelligence (AI). |
Разместил: Ingvar16 5-10-2022, 14:06 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Cybersecurity for Small Networks: A No-Nonsense Guide for the Reasonably Paranoid Автор: Seth Enoka Издательство: No Starch Press Год: 2022 Страниц: 226 Язык: английский Формат: pdf (true), epub (true), mobi Размер: 21.9 MB
A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack. This book is an easy-to-follow series of tutorials that will lead readers through different facets of protecting household or small-business networks from cyber attacks. You’ll learn how to use pfSense to build a firewall, lock down wireless, segment a network into protected zones, configure a VPN (virtual private network) to hide and encrypt network traffic and communications, set up proxies to speed up network performance and hide the source of traffic, block ads, install and configure an antivirus, back up your data securely, and even how to monitor your network for unauthorized activity and alert you to intrusion. For our purposes, a small network consists of 100 or fewer endpoints. An endpoint, or host, is any system or device that connects to or is part of a network, such as a desktop or laptop computer or a mobile device like a phone or tablet. Larger networks, approaching the size of an enterprise network, use similar tools and techniques that are covered in this book to provide security to their users and systems, just on a much larger scale and often at a much higher cost. |
Разместил: Ingvar16 5-10-2022, 12:48 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: How to Hack Like a Legend: Breaking Windows Автор: Sparc Flow Издательство: No Starch Press Год: 2022 Страниц: 218 Язык: английский Формат: pdf (true) Размер: 10.2 MB
Tag along with a master hacker on a truly memorable attack. From reconnaissance to infiltration, you’ll experience their every thought, frustration, and strategic decision-making first-hand in this exhilarating narrative journey into a highly defended Windows environment driven by AI. Step into the shoes of a master hacker and break into an intelligent, highly defensive Windows environment. You’ll be infiltrating the suspicious (fictional) offshoring company G & S Trust and their hostile Microsoft stronghold. While the target is fictional, the corporation’s vulnerabilities are based on real-life weaknesses in today’s advanced Windows defense systems. |
Разместил: Ingvar16 5-10-2022, 12:23 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Cybersecurity: A Practical Engineering Approach Автор: Henrique M. D. Santos Издательство: CRC Press Серия: Chapman & Hall/CRC Textbooks in Computing Год: 2022 Страниц: 341 Язык: английский Формат: pdf (true), epub Размер: 16.9 MB
Cybersecurity: A Practical Engineering Approach introduces the implementation of a secure cyber architecture, beginning with the identification of security risks. It then builds solutions to mitigate risks by considering the technological justification of the solutions as well as their efficiency. The process follows an engineering process model. Each module builds on a subset of the risks, discussing the knowledge necessary to approach a solution, followed by the security control architecture design and the implementation. Kerberos is a network authentication protocol, aiming to achieve strong authentication using secret-key cryptography, in a local network environment with shared services. In fact, it embraces several sub protocols to accomplish that goal. Pentest (short for Penetration Test, and also referred to by Ethical Hacking) is a fundamental activity in Cybersecurity, aiming to test a computerized system against possible failures resulting from simulated malicious activity. |
Разместил: Ingvar16 4-10-2022, 13:36 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Semantic Models in IoT and eHealth Applications Автор: Sanju Tiwari, Fernando Ortiz Rodriguez Издательство: Academic Press, Elsevier Серия: Intelligent Data-Centric Systems Год: 2022 Страниц: 292 Язык: английский Формат: pdf (true) Размер: 12.8 MB
Semantic Models in IoT and eHealth Applications explores the key role of semantic web modeling in eHealth technologies, including remote monitoring, mobile health, cloud data and biomedical ontologies. The book explores different challenges and issues through the lens of various case studies of healthcare systems currently adopting these technologies. Chapters introduce the concepts of semantic interoperability within a healthcare model setting and explore how semantic representation is key to classifying, analyzing and understanding the massive amounts of biomedical data being generated by connected medical devices. |
Разместил: Ingvar16 3-10-2022, 12:51 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Design of Internet of Things Автор: Gunneswara VSSS Kalaga Rao Издательство: CRC Press Год: 2023 Страниц: 147 Язык: английский Формат: pdf (true), epub Размер: 28.0 MB
This book provides a comprehensive overview of the design aspects of the Internet of Things devices and covers the fundamentals of Big Data and Embedded Programming. Various changing technologies, like sensors, RFID, etc., that are promoting IoT solutions are discussed. The core technologies like GSM Communication, Machine to Machine (M2M) Interfaces that are supposed to be the foundations for IoT are explained to prepare the designer. Definitions of IoT, different architectures of IoT, possible models of IOT, along with different market needs and Industry requirements are detailed, so that designers can finalize their choices that enable them to prepare PERT like basics. IEEE Standards useful to IoT design and a few Network Protocol Stacks are explored in detail that will give confidence to any designer. Embedded Operating Systems (FreeRTOS and Contiki) and various Middleware frameworks useful to IoT are discussed. |
Разместил: Ingvar16 2-10-2022, 17:52 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: IoT Based Smart Applications Автор: Nidhi Sindhwani, Rohit Anand, M. Niranjanamurthy Издательство: Springer, EAI Год: 2023 Страниц: 406 Язык: английский Формат: pdf (true) Размер: 14.1 MB
This book provides insights into IoT, its applications, and various implementation techniques. The authors first discuss the IoT design methodology to define the domain model. They then cover various connection methodologies used in IoT such as Ethernet, Wi-Fi, low powered wide area network (LPWAN), Bluetooth, RFID, cellular, and satellite, and more, along with their challenges. An example is made on the designing process using Arduino, which offers smart, connected, and secure elements; they also illustrate the integration of IoT with Blockchain, cloud, machine learning, big data, embedded software, sensors, etc. The book going on to cover the future of IoT in various sectors and how IoT will continue to be game-changing technology. |
Разместил: Ingvar16 1-10-2022, 12:04 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Multiple Access Technology Towards Ubiquitous Networks: Overview and Efficient Designs Автор: Neng Ye, Xiangming Li, Kai Yang, Jianping An Издательство: Springer Год: 2023 Страниц: 194 Язык: английский Формат: pdf Размер: 10.2 MB
This book investigates the multiuser communication and its key technology—multiple access technology, as well as transceiving design methods. The future wireless communication networks are expected to provide ubiquitous massive coverage to meet the requirements of diversified applications. With an exponential increase of the number of users and devices, it is challenging to establish fast and reliable connections in the ubiquitous network. As the core technology in the evolution of wireless communication systems, multiple access technology can enable effective massive connections and has become the prominent research trend for ubiquitous networks. The goal of this book is to provide readers with a comprehensive overview of the state-of-the-art multiple access technologies for ubiquitous network, with a focus on the novel ubiquitous multiple access technologies, the signal construction techniques of multiple access and the enhanced multiple access transceivers using Artificial Intelligence (AI). For each of these topics, this book has tried to provide an advanced introduction, blending the basic multi-user information principles with the advanced multiple access models and novel application scenarios. In addition, this book has provided elaborate simulation results for each topic to verify the feasibility of the corresponding schemes. |
Разместил: Ingvar16 30-09-2022, 15:26 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach Автор: Behrouz Zolfaghari, Khodakhast Bibak Издательство: Springer Год: 2022 Страниц: 121 Язык: английский Формат: pdf Размер: 10.2 MB
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-secure cryptosystem guarantees that the malicious third party cannot guess anything regarding the plain text or the key, even in the case of full access to the cipher text. Despite this advantage, there are only a few real-world implementations of perfect secrecy due to some well-known limitations. Any simple, straightforward modeling can pave the way for further advancements in the implementation, especially in environments with time and resource constraints such as IoT. This book takes one step towards this goal via presenting a hybrid combinatorial-Boolean model for perfectly-secure cryptography in IoT. In this book, we first present an introduction to information-theoretic cryptography as well as perfect secrecy and its real-world implementations. Then we take a systematic approach to highlight information-theoretic cryptography as a convergence point for existing trends in research on cryptography in IoT. Then we investigate combinatorial and Boolean cryptography and show how they are seen almost everywhere in the ecosystem and the life cycle of information-theoretic IoT cryptography. We finally model perfect secrecy in IoT using Boolean functions, and map the Boolean functions to simple, well-studied combinatorial designs like Latin squares. |
Разместил: Ingvar16 30-09-2022, 15:09 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: IoT-enabled Unobtrusive Surveillance Systems for Smart Campus Safety Автор: Theodoros Anagnostopoulos Издательство: Wiley-ISTE Год: 2023 Страниц: 163 Язык: английский Формат: pdf (true) Размер: 10.1 MB
IoT-enabled Unobtrusive Surveillance Systems for Smart Campus Safety Enables readers to understand a broad area of state-of-the-art research in physical IoT-enabled security. IoT-enabled Unobtrusive Surveillance Systems for Smart Campus Safety describes new techniques in unobtrusive surveillance that enable people to act and communicate freely, while at the same time protecting them from malevolent behavior. It begins by characterizing the latest on surveillance systems deployed at smart campuses, miniatures of smart cities with more demanding frameworks that enable learning, social interaction, and creativity, and by performing a comparative assessment in the area of unobtrusive surveillance systems for smart campuses. |
Разместил: Ingvar16 29-09-2022, 13:27 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
br>
|