|
 |
|
 |
|
|
 |
|  |
|
Название: Machine-Type Communication for Maritime Internet-of-Things: From Concept to Practice Автор: Michael Mao Wang, Jingjing Zhang Издательство: Springer Серия: Wireless Networks Год: 2021 Страниц: 303 Язык: английский Формат: pdf (true), epub Размер: 24.8 MB
This book introduces the concept of machine-type communication (MTC) for maritime Internet of Things. The first part of the book portrays a maritime MTC system from an architectural perspective and describes an MTC framework and the fundamental components, laying out a foundation that leads to an ultimate solution to the maritime IoT requirements and challenges. The second part ties together all discussed in the first part and demonstrates how to apply it to a practical system through a realistic design example based on an international maritime mobile spectrum. The book serves as a comprehensive tutorial of the maritime MTC from the top (the network architecture) to the bottom (the air/radio interface and regulatory radio spectrum constraints), guiding readers to an easier understanding of the maritime MTC-related issues and the rationale behind the design. |
Разместил: Ingvar16 27-10-2021, 06:40 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Blockchain for International Security: The Potential of Distributed Ledger Technology for Nonproliferation and Export Controls Автор: Cindy Vestergaard Издательство: Springer Год: 2021 Страниц: 116 Язык: английский Формат: pdf (true), epub Размер: 10.2 MB
This book intersects the distributed ledger technology (DLT) community with the international security community. Given the increasing application of blockchain technology in the fields of business and international development, there is a growing body of study on other use cases. For instance, can blockchain have a significant role in preserving and improving international security? Emerging technologies such as Artificial Intelligence (AI) and blockchain technologies can enhance the integrity of data while bridging secure rooms with secure networks while advances in robotics and the Internet of Things (IoT) can help to maintain a continuity of knowledge over unattended systems. Blockchain technology, a subset of distributed ledger technology (DLT), is the focus of this book as it has been increasingly adopted by industries to create greater efficiencies and security across business operations, particularly for supply chains. |
Разместил: Ingvar16 27-10-2021, 06:24 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Network Security And Cyber Defense (CNSS) Автор: Singh Gurpej Издательство: Independently Published Год: 2021 Формат: EPUB Размер: 67 Мб Язык: английский / English
It provides a holistic view of modern network security including operating system hardening, Firewalls, intrusion-detection systems, VPNs and Encryption.Physical Security, Standards, System Security and Security Policies are also included. Before diving into how to protect a network, exploring what networks are,would probably be a good idea. For many readers this section will be a review, but for some it might be new material. Whether this is a review for you, or new information, having a thorough understanding of basic networking before attempting to study network security is critical. Also, be aware this is just a brief introduction of basic network concepts. |
Разместил: black 24-10-2021, 11:21 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Computational Intelligence for Information Retrieval Автор: Dharmender Saini,Gopal Chaudhary, Vedika Gupta Издательство: CRC Press Год: 2022 Формат: True PDF Страниц: 292 Размер: 51 Mb Язык: English
This book provides a thorough understanding of the integration of computational intelligence with information retrieval including content-based image retrieval using intelligent techniques, hybrid computational intelligence for pattern recognition, intelligent innovative systems, and protecting and analysing big data on cloud platforms. This book aims to investigate how computational intelligence frameworks are going to improve information retrieval systems. The emerging and promising state-of-the-art of human-computer interaction is the motivation behind this book. The book covers a wide range of topics, starting from the tools and languages of artificial intelligence to its philosophical implications, and thus provides a plethora of theoretical as well as experimental research, along with surveys and impact studies. Further, the book aims to showcase the basics of information retrieval and computational intelligence for beginners as well as their integration and challenge discussions for existing practitioners, including using hybrid application of augmented reality, computational intelligence techniques for recommendation system in big data and a fuzzy-based approach for characterization and identification of sentiments. |
Разместил: vitvikvas 24-10-2021, 06:56 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Cybercrime and Preventive Measures: A Quick Guide to Get Yourself Secured and Protected from Digital Threats, Social Media Risks, and Cyber Criminals Автор: Priyanka Tomar, Sanjay Gautam Издательство: BPB Publications Год: 2021 Страниц: 129 Язык: английский Формат: pdf, epub Размер: 10.2 MB
Cyber crime stories and tricks used by cyber criminals to trap people and preventive tips to avoid cyber crimes. The book 'Cybercrime and Preventive Measures' provides a strong and precise introduction to the world of cybercrime and the need of cyber awareness for everyone. It begins with email-related popular cyber crimes such as phishing, spamming, spoofing, email bombing, etc. It talks about the methodologies adopted by cyber criminals to trap people along with some real-case studies (names of victims changed) and preventive measures to be taken to safeguard against email-related cyber crime. |
Разместил: Ingvar16 23-10-2021, 18:53 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Сети мобильной связи: Частотно-территориальное планирование Автор: Бабков В.Ю. Вознюк М.А. Михайлов П.А. Издательство: М.: Горячая линия-Телеком Год: 2007 - 2-е изд., исправ. Cтраниц: 228 Формат: pdf Размер: 53 мб
Изложены основные принципы частотно-территориального планирования сетей подвижной (сотовой, транкинговой, пейджерной) и фиксированной (абонентского доступа) радиосвязи. Приведены рекомендации по использованию методик и алгоритмов частотно-территориального планирования сетей различных стандартов. |
Разместил: rivasss 23-10-2021, 13:36 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Network Automation Made Easy Автор: Ivo Pinto Издательство: Cisco Systems Год: 2021 Формат: ePUB Страниц: 320 Размер: 33 Mb Язык: English
Practical strategies and techniques for automating network infrastructure As networks grow ever more complex, network professionals are seeking to automate processes for configuration, management, testing, deployment, and operation. Using automation, they aim to lower expenses, improve productivity, reduce human error, shorten time to market, and improve agility. In this guide, expert practitioner Ivo Pinto presents all the concepts and techniques youll need to move your entire physical and virtual infrastructure towards greater automation and maximize the value it delivers. |
Разместил: vitvikvas 22-10-2021, 19:09 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: CompTIA Security+ Certification Bundle (Exam SY0-601), 4th Edition Автор: Glen Clarke, Daniel Lachance Издательство: McGraw Hill Год: 2022 Страниц: 2400 Язык: английский Формат: True EPUB Размер: 46.7 MB
This money-saving collection covers every objective for the CompTIA Security+ exam and contains exclusive bonus content. This fully updated test preparation bundle covers every topic on the current version of the CompTIA Security+ exam. Designed to be the ultimate self-study resource, this collection includes the current editions of CompTIA Security+ Certification Study Guide and CompTIA Security+ Certification Practice Exams along with exclusive online content―all at a discount of 12% off of the suggested retail price.
|
Разместил: Ingvar16 22-10-2021, 17:42 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Trust Models for Next-Generation Blockchain Ecosystems Автор: Muhammad Habib ur Rehman, Davor Svetinovic Издательство: Springer Год: 2021 Страниц: 289 Язык: английский Формат: pdf (true), epub Размер: 28.3 MB
This book discusses the trust models for next-generation Blockchain ecosystems. The book provides a comprehensive discussion on various trust factors involving security, anonymization, reputation, governance, economic models, and other relevant determinants. The book covers various topics in breadth and depth. In addition, it sets the foundation to involve the readers in understanding the core theories supplemented with technical and experimental discussion. The book starts by laying out the foundations of trust models in Blockchain ecosystems. The authors then provide a study of existing trust models Blockchain networks. They then provide identification of trust factors and discuss each trust factor. The book concludes with a future outlook of trust-enabling Blockchain ecosystems.
|
Разместил: Ingvar16 22-10-2021, 06:03 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Modern Cybersecurity Practices: Exploring And Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization Автор: Pascal Ackerman Издательство: BPB Publications Год: 2020 Страниц: 394 Язык: английский Формат: epub Размер: 19.9 MB
A practical book that will help you defend against malicious activities. Modern Cybersecurity practices will take you on a journey through the realm of Cybersecurity. The book will have you observe and participate in the complete takeover of the network of Company-X, a widget making company that is about to release a revolutionary new widget that has the competition fearful and envious. The book will guide you through the process of the attack on Company-X’s environment, shows how an attacker could use information and tools to infiltrate the companies network, exfiltrate sensitive data and then leave the company in disarray by leaving behind a little surprise for any users to find the next time they open their computer.
|
Разместил: Ingvar16 22-10-2021, 04:02 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
br>
|