|
|
|
|
|
|
|
| |
|
Название: Networked Control Systems: Theory, Applications and Analysis Автор: Shiwen Tong, Dianwei Qian Издательство: Nova Science Pub Inc Год: 2021 Страниц: 172 Язык: английский Формат: pdf (true) Размер: 11.45 MB
Networked Control System (NCS) can be regarded as a special type of control system in which sensors, controllers and actuators are connected to a closed loop. Media-sharing characteristics, time-delay, data packet dropout and data displacement are inevitable phenomena in such a control system, which can greatly degrade the control performance, and even make the control system unstable. Alleviating these effects has become one of the most attractive research hotspots in the last two decades. All the above three problems can be summarized as the time-delay issue. In this book, different aspects of networked control are explored. Chapters includes some new tendencies and developments in research on Networked Predictive Fuzzy Control (NPFC), Data-based Networked Tracking Control (DNTC), Data-based Adaptive Networked Tracking Control (DNATC), Controller Parameters Tuning through Network, Event-Triggered Control of Networked System and Multi-Agent Systems (MAS). |
Разместил: Ingvar16 12-09-2021, 16:53 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: The Smart Cyber Ecosystem for Sustainable Development Автор: Pardeep Kumar, Vishal Jain, Vasaki Ponnusamy Издательство: Wiley-Scrivener Год: 2021 Страниц: 480 Язык: английский Формат: pdf (true), epub Размер: 65.9 MB
The Cyber Ecosystem can be a replica of our natural ecosystem where different living and non-living things interact with each other to perform specific tasks. Similarly, the different entities of the cyber ecosystem collaborate digitally with each other to revolutionize our lifestyle by creating smart, intelligent, and automated systems/processes. The main actors of the cyber ecosystem, among others, are the Internet of Things (IoT), Artificial Intelligence (AI), and the mechanisms providing cybersecurity. |
Разместил: Ingvar16 12-09-2021, 16:19 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: VoIP Telephony and You: A Guide to Design and Build a Resilient Infrastructure for Enterprise Communications Using the VoIP Technology Автор: Rashmi Nanda Издательство: BPB Publications Год: 2021 Страниц: 646 Язык: английский Формат: pdf, epub Размер: 17.3 MB
A Game Changer for WFH Practitioners. "VoIP Telephony and You" introduces you to new and advanced ways of communicating over traditional telephony realms. Telcos use public internet private IPs for this long-distance voice communication. This book describes how VoIP encompasses the capability to encode and deliver content in real-time across digitized networks. In this book, you will learn about VoIP regulations, VoIP hardware and software, video conferencing servers, SWOT analysis of Telcos, switching technology. You will also learn about the TCP/IP, market, Economics model, business model, and technology models. You will learn how to eliminate echo by understanding the various interfaces of VoIP and a number of digital protocols. This book will also provide you with a solution to design and maintain communication systems that can be used reliably. This book includes several best practices and security measures to secure conversations by use of surveillance methods and VoIP security provisions. |
Разместил: Ingvar16 12-09-2021, 15:22 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Blockchain and IoT Integration: Approaches and Applications Автор: Kavita Saini Издательство: CRC Press Год: 2022 Формат: True PDF Страниц: 208 Размер: 18,3 Mb Язык: English
As technology continues to advance and the interconnection of various devices makes our lives easier, it also puts us at further risk of privacy and security threats. Phones can connect to household devices to help set alarms, turn on or off the lights, and even preheat ovens. The Internet of Things (IoT) is this symbiotic interplay of smart devices that collect data and make intelligent decisions. However, the lack of an intrinsic security measure within IoT makes it especially vulnerable to privacy and security threats. Blockchain and IoT Integration highlights how Blockchain, an encrypted, distributed computer filing system, can be used to help protect IoT against such privacy and security breaches. The merger of IoT and blockchain technology is a step towards creating a verifiable, secure, and permanent method of recording data processed by "smart" machines. The text explores the platforms and applications of blockchain-enabled IoT as well as helps clarify how to strengthen the IoT security found in healthcare systems as well as private homes. |
Разместил: vitvikvas 12-09-2021, 10:20 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cybersecurity and Third-Party Risk: Third Party Threat Hunting Автор: Gregory C. Rasner Издательство: Wiley Год: 2021 Страниц: 483 Язык: английский Формат: pdf (true) + pdf (conv), epub Размер: 10.16 MB, 10.1 MB
Strengthen the weakest links in your cybersecurity chain. Across the world, the networks of hundreds of different world-class organizations have been breached in a seemingly never-ending stream of attacks that targeted the trusted vendors of major brands. From Target to Equifax, Home Depot, and GM, it seems as if no company is safe from a third-party incident or breach, regardless of size. And the advanced threats are now exploiting the intersection of weaknesses in cybersecurity and third-party risk management. In Cybersecurity and Third-Party Risk, veteran cybersecurity specialist Gregory Rasner walks readers through how to lock down the vulnerabilities posed to an organization's network by third parties. You'll discover how to move beyond a simple checklist and create an active, effective, and continuous system of third-party cybersecurity risk mitigation. |
Разместил: Ingvar16 11-09-2021, 22:20 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Ethical Hacking: A Hands-on Introduction to Breaking In Автор: Daniel G. Graham. Издательство: No Starch Press Год: 2021 Формат: ePUB Страниц: 376 Размер: 11 Mb Язык: English
A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you’ll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. |
Разместил: vitvikvas 10-09-2021, 19:10 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: XSS Attacks Автор: Jeremiah Grossman, Robert "RSnake" Hansen, Petko "pdp" D. Petkov, Anton Rager Издательство: Syngress Год: 2007 Формат: ePUB Страниц: 1082 Размер: 87,2 Mb Язык: English
A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data. XSS Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and jаvascript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Finally, the book closes by examining the ways developers can avoid XSS vulnerabilities in their web applications, and how users can avoid becoming a victim. The audience is web developers, security practitioners, and managers. |
Разместил: vitvikvas 9-09-2021, 20:15 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: The Automated City: Internet of Things and Ubiquitous Artificial Intelligence Автор: Seng W. Loke, Andry Rakotonirainy Издательство: Springer Год: 2021 Страниц: 176 Язык: английский Формат: pdf (true), epub Размер: 10.6 MB
The book outlines the concept of the Automated City, in the context of smart city research and development. While there have been many other perspectives on the smart city such as the participatory city and the data-centric city, this book focuses on automation for the smart city based on current and emerging technologies such as the Internet of Things, Artificial Intelligence (AI) and Robotics. The book attempts to provide a balanced view, outlining the promises and potential of the Automated City as well as the perils and challenges of widespread automation in the city. The book discusses, at some depth, automated vehicles, urban robots and urban drones as emerging technologies that will automate many aspects of city life and operation, drawing on current work and research literature. The book also considers broader perspectives of the future city, in the context of automation in the smart city, including aspirational visions of cities, transportation, new business models, and socio-technological challenges, from urban edge computing, ethics of the Automated City and smart devices, to large scale cooperating autonomous systems in the city. |
Разместил: Ingvar16 9-09-2021, 19:46 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Wireless Coexistence: Standards, Challenges, and Intelligent Solutions Автор: Daniel Chew, Andrew L. Adams Издательство: Wiley/IEEE Press Год: 2021 Страниц: 338 Язык: английский Формат: pdf (true), epub Размер: 41.3 MB
Explore a comprehensive review of the motivation for wireless coexistence and the standards and technology used to achieve it. Wireless Coexistence: Standards, Challenges, and Intelligent Solutions delivers a thorough exploration of wireless ecosystems sharing the spectrum, including the multiple standards and key requirements driving the current state of wireless technology. The book surveys several standards, including IEEE 802.22, 802.15.2, and 802.19.1 and expands upon recent advances in machine learning and artificial intelligence to demonstrate how these technologies might be used to meet or exceed the challenges of wireless coexistence. The text discusses cognitive radio in the context of spectrum coexistence and provides a comparison and assessment of using Artificial Intelligence in place of, or in addition to, current techniques. It also considers applications to communication theory, learning algorithms for passive wireless coexistence strategies, spectrum situational awareness, and active wireless coexistence strategies. |
Разместил: Ingvar16 9-09-2021, 12:41 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks Автор: Chris Peiris, Binil Pillai, Abbas Kudrati Издательство: Wiley Год: 2021 Формат: PDF Страниц: 547 Размер: 29 Mb Язык: English
Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting pros In Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Binil Pillai, and Abbas Kudrati leverage their decades of experience building large scale cyber fusion centers to deliver the ideal threat hunting resource for both business and technical audiences. You'll find insightful analyses of cloud platform security tools and, using the industry leading MITRE ATT&CK framework, discussions of the most common threat vectors. You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services and deliver a multi-cloud strategy for enterprise customers. And you will find out how to create a vendor-neutral environment with rapid disaster recovery capability for maximum risk mitigation. |
Разместил: vitvikvas 9-09-2021, 11:30 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|