|
|
|
|
|
|
|
| |
|
Название: The Real Internet Architecture: Past, Present, and Future Evolution Автор: Pamela Zave, Jennifer Rexford Издательство: Princeton University Press Год: 2024 Страниц: 256 Язык: английский Формат: epub (true) Размер: 10.1 MB
A new way to understand the architecture of today's Internet, based on an innovative general model of network architecture that is rigorous, realistic, and modular. This book meets the long-standing need for an explanation of how the Internet's architecture has evolved since its creation to support an ever-broader range of the world's communication needs. The authors introduce a new model of network architecture that exploits a powerful form of modularity to provide lucid, insightful descriptions of complex structures, functions, and behaviors in today's Internet. Countering the idea that the Internet's architecture is "ossified" or rigid, this model—which is presented through hundreds of examples rather than mathematical notation—encompasses the Internet's original or "classic" architecture, its current architecture, and its possible future architectures. For practitioners, the book offers a precise and realistic approach to comparing design alternatives and guiding the ongoing evolution of their applications, technologies, and security practices. For educators and students, the book presents patterns that recur in many variations and in many places in the Internet ecosystem. Each pattern tells a compelling story, with a common problem to be solved and a range of solutions for solving it. For researchers, the book suggests many directions for future research that exploit modularity to simplify, optimize, and verify network implementations without loss of functionality or flexibility. We expect this book to be interesting to anyone involved with today’s computer networks, regardless of whether they are engineers (network designers and operators), academics (faculty and graduate students), researchers, or product developers. The book is not an introductory text, however, and readers will get the most out of this book if they have the kind of general knowledge taught in an undergraduate networking course. |
Разместил: Ingvar16 27-06-2024, 17:03 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Defensive Security Handbook: Best Practices for Securing Infrastructure, 2nd Edition (Final) Автор: Amanda Berlin, Lee Brotherston, William F. Reyor III Издательство: O’Reilly Media, Inc. Год: 2024 Страниц: 417 Язык: английский Формат: epub Размер: 10.1 MB
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with issues such as breaches and disasters, compliance, network infrastructure, password management, vulnerability scanning, penetration testing, and more. Network engineers, system administrators, and security professionals will learn how to use frameworks, tools, and techniques to build and improve their cybersecurity programs. This book is designed to serve as a Security 101 handbook that is applicable to as many environments as possible, in order to drive maximum improvement in your security posture for the minimum financial spend. Types of positions that will be able to take away knowledge and actionable data from this include upper-level chief information officers (CIOs), directors, security analysts, systems administrators, and other technological roles. |
Разместил: Ingvar16 27-06-2024, 09:37 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Security Officers and Supervisors: 150 Things You Should Know Автор: Lawrence J. Fennelly, Marianna A. Perry Издательство: CRC Press Год: 2025 Страниц: 396 Язык: английский Формат: pdf (true) Размер: 10.1 MB
Security Officers and Supervisors: 150 Things You Should Know presents an array of relevant topics, including addressing “Tips of the Trade” in how to manage a team of professionals and serve as an effective supervisor. This includes both keeping management informed of decisions, aligning policy, procedure, and training with business objectives, and hiring and managing a team of professionals to maintain continuity of operations and a safe, secure environment. There are many factors involved in managing a department and workforce and the book uses a handy-reference format to present the salient information, both concrete knowledge as well as the softer skills, required for managers to motivate individuals and lead teams to pull in the same direction. Short, easy-to-read chapters include lists of relevant definitions, some do’s and don’ts, best practices, emerging trends, and well as example case studies based upon the authors’ professional experience. The primary goal is to provide a foundation for readers to identify, comprehend, and apply management concepts and security principles in their own environments so that readers will be readily prepared to troubleshoot problems and overcome challenges. |
Разместил: Ingvar16 27-06-2024, 02:57 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems, Third Edition Автор: Eric D. Knapp Издательство: Syngress/Elsevier Год: 2024 Страниц: 518 Язык: английский Формат: epub (true) Размер: 48.6 MB
As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Third Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems. Authors Eric Knapp and Joel Langill examine the unique protocols and applications that are the foundation of Industrial Control Systems (ICS), and provide clear guidelines for their protection. This comprehensive reference gives you thorough understanding of the challenges facing critical infrastructures, new guidelines and security measures for infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation. Formal education is offered by many universities as well as organizations such as the Cybersecurity and Infrastructure Security Agency (CISA), the International Information System Security Certification Consortium (ISC2), the SANS Technology Institute, and others. At the same time, for many readers coming from backgrounds in both industrial control (“OT”) and information technology (“IT”), the idea of industrial cyber security will be entirely new. One thing that has definitely changed: it is no longer optional to ignore the subject of securing industrial automation and process control environments from the ever rising threat of a cyberattack. |
Разместил: Ingvar16 27-06-2024, 02:29 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Smart Global Value Chain: Future Innovations Автор: Adarsh Garg, Amrita Jain, Manisha Singh, Fadi Al-Turjman Издательство: CRC Press Год: 2025 Страниц: 292 Язык: английский Формат: pdf (true) Размер: 12.9 MB
Innovation is a critical facilitator in today’s fast-changing global value chain landscape. This book describes the interplay of technological breakthroughs enabling efficiency and intelligence within value chains, making them smart and sustainable. From service models and smart technologies to the application of smart global value chains across sectors, this book offers a unique insight into the transformational role of smart global value chains in bringing agility and sustainability to the global value chain ecosystem. The term “smart networking” refers to the practice of leveraging digital resources to facilitate more productive interpersonal interactions. Building and maintaining professional relationships and accomplishing individual and organizational objectives require the use of a wide range of online platforms and applications, such as social media, messaging apps, and collaboration software. Machine Learning and Artificial Intelligence (AI) facilitators have started to be part of our daily lives and have significant effects on the rapid developments of the Internet of Things. Mobile cloud computing (MCC) and the Internet of Things (IoT) have emerged as two transformative technologies that are reshaping the digital landscape. The widespread adoption of mobile devices and the proliferation of connected devices have created new opportunities and challenges for delivering efficient and scalable services in these domains. To address these challenges, service models tailored specifically for MCC and IoT applications have been developed. This book is an essential guide for academics, industry leaders, and policymakers to navigate the future where smart technologies like Artificial Intelligence, Machine Learning, blockchain, Internet of Things, and beyond reshape the global economic landscape. |
Разместил: Ingvar16 26-06-2024, 08:12 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Развитие сетей мобильной связи от 5G Advanced к 6G: проекты, технологии, архитектура Автор: Тихвинский В.О., Терентьев С.В., Коваль В.А., Девяткин Е.Е. Издательство: Москва: Техносфера Год: 2023 Формат: pdf Страниц: 528 Размер: 14 mb Язык: Русский
В книге рассмотрены перспективы эволюционного развития и стандартизации технологий мобильной связи пятого поколения 5G Advanced / IMT-2020 на пути к 6G/IMT-2030 международными организациями связи, представлены планы развития технологий 5G Advanced партнерским проектом 3GPP в релизах 17 и 18, проанализированы основные бизнес-модели услуг и индустриальные приложения в сетях 5G Advanced / IMT-2020, рассмотрены цепочки создания стоимости услуг 5G. Проведена оценка возможностей выделения частотных диапазонов для развития сетей 5G и 6G с учетом повестки дня ВКР-23, рассмотрены особенности построения и архитектура сети радиодоступа 5G RAN фазы 3 (релиз 17), виды сигналов, нумерология их формирования и частотные каналы, используемые в сетях радиодоступа 5G Advanced. |
Разместил: na5ballov 25-06-2024, 09:16 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Intelligent Secure Trustable Things Автор: Michael Karner, Johannes Peltola, Michael Jerne, Lukas Kulas Издательство: Springer Серия: Studies in Computational Intelligence Год: 2024 Страниц: 446 Язык: английский Формат: pdf (true) Размер: 16.4 MB
This book provides an overview about results of the InSecTT project. Artificial Intelligence of Things (AIoT) is the natural evolution for both Artificial Intelligence (AI) and Internet of Things (IoT) because they are mutually beneficial. AI increases the value of the IoT through machine learning by transforming the data into useful information, while the IoT increases the value of AI through connectivity and data exchange. Therefore, InSecTT—Intelligent Secure Trustable Things, a pan-European effort with over 50 key partners from 12 countries, provides intelligent, secure and trustworthy systems for industrial applications to provide comprehensive cost-efficient solutions of intelligent, end-to-end secure, trustworthy connectivity and interoperability to bring the Internet of Things and Artificial Intelligence together. InSecTT creates trust in AI-based intelligent systems and solutions as a major part of the AIoT. The Internet of Things (IoT) is a revolutionary change for many sectors: Fitness trackers measure our movements, smart fire extinguishers monitor their own readiness for action, and cars turned out to become fully connected vehicles. The availability of the collected data goes hand in hand with the development of Artificial Intelligence (AI) and Machine Learning (ML) algorithms to process them. Despite numerous benefits, the vulnerability of these devices in terms of security remains an issue. Hacks of webcams, printers, children’s toys, and even vacuum cleaners as well as Distributed Denial-of-service (DDoS) attacks reduce confidence in this technology. The first part of the book provides an introduction into the main topics of the InSecTT project: How to bring Internet of Things and Artificial Intelligence together to form the Artificial Intelligence of Things, a reference architecture for such kind of systems and how to develop trustworthy, ethical AI systems. In the second part, we show the development of essential technologies for creating trustworthy AIoT systems. The third part of the book is composed of a broad variety of examples on how to design, develop and validate trustworthy AIoT systems for industrial applications (including automotive, avionics, smart infrastructure, health care, manufacturing and railway). |
Разместил: Ingvar16 23-06-2024, 16:34 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Компьютерные сети. Нисходящий подход Автор: Куроуз Джеймс, Росс Кит Издательство: Эксмо Год: 2016 Страниц: 912 Формат: pdf/djvu Размер: 46 мб Язык: русский
Книга знакомит читателя с фундаментальными основами построения и функционирования компьютерных сетей на примере пятиуровневой архитектуры сети Интернет. Описаны базовые компоненты компьютерной сети, ключевые подходы к передаче данных в телекоммуникационных сетях, принципы взаимодействия сетей друг с другом, подробно рассмотрены важнейшие службы и протоколы всех уровней сетевой архитектуры. Отдельная глава посвящена беспроводным и мобильным сетям и их особенностям. |
Разместил: rivasss 23-06-2024, 07:20 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Modelling of Virtual Worlds Using the Internet of Things Автор: Simar Preet Singh, Arun Solanki Издательство: CRC Press Серия: Intelligent Data-Driven Systems and Artificial Intelligence Год: 2024 Страниц: 337 Язык: английский Формат: pdf (true) Размер: 10.1 MB
The text presents aspects of virtual worlds and highlights the emerging trends in simulation and modeling, comprising Machine Learning, Artificial Intelligence, Deep Learning, robotics, cloud computing, and data mining algorithms. It further discusses concepts including multimedia for the Internet of Things, graphical modeling using emerging technologies, and securing communication with secure data transmission in the modeling of virtual worlds. Modelling of Virtual Worlds Using the Internet of Things (MVWIoT) is becoming the need of the present world. With the advancements of technology in recent times, many developments have occurred in a very short span of time. This book will focus on deeper aspects of the Internet of Things (IoT) and will cover simulations and modelling of visual worlds in Internet of Things (IoT) domain. In present times, the Internet of Things (IoT) is in broad use, ranging from small devices like mobile phones to big professional computers. Hand-held devices, which have the capability of getting an Internet Protocol (IP) address and can be connected to the Internet, come under the category of an Internet of Things (IoT) device. This book is intended to cover various problematic aspects of visual worlds and highlight the emerging trends in simulation and modelling, comprising of Machine Learning, Artificial Intelligence, Deep Learning, robotics, cloud computing, fog computing, and data mining algorithms, including emerging intelligent and smart applications related to these research areas. The book is intended to cover the recent approaches in Artificial Intelligence and Machine Learning methods using the Internet of Things (IoT). |
Разместил: Ingvar16 22-06-2024, 20:53 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Attack-and-Defense Games for Control Systems Автор: Huanhuan Yuan, Yuan Yuan, Huapeng Dong, Yuanqing Xia Издательство: CRC Press Год: 2024 Страниц: 252 Язык: английский Формат: pdf (true) Размер: 16.0 MB
Complex control systems, including cyber-physical and cloud control systems, are in open network environments and are often confronted with threats from cyberspace, physical space and even cloud service. With diversified and intelligent attack patterns and improvements in attack capabilities, non-contact damage can be widespread. In this book, the authors use a formal, mathematical approach to introduce their recent research findings to describe and design attack and defense strategies using game theoretic method. The book is divided into three sections, focusing on strategies for resilience against deception attacks and DoS attacks, and protecting cloud control systems against threats. In these sections, the authors address topics such as secure and distributed filtering, attack detection and disturbance rejection, resilient state estimation, and resilient control, and techniques such as Stackelberg games, hierarchical games, and active eavesdropping. Through this book readers will be able to design effective defense strategies for complex control system to achieve resilience for closed-control cyber physical systems, network and cloud systems. |
Разместил: Ingvar16 21-06-2024, 21:14 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|