|
 |
|
 |
|
|
 |
|  |
|
Название: Creating and Managing Virtual Machines and Networks Through Microsoft Azure Services for Remote Access Connection Автор: Dr. Hidaia Mahmood Alassouli Издательство: Independently published Год: 2021 Страниц: 137 Язык: английский Формат: pdf, azw3, epub Размер: 15.4 MB
Microsoft Azure, commonly referred to as Azureis a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through Microsoft-managed data centers. It provides software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS) and supports many different programming languages, tools, and frameworks, including both Microsoft-specific and third-party software and systems. |
Разместил: Ingvar16 4-02-2021, 18:25 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Infrastructure as Code: Dynamic Systems for the Cloud Age, Second Edition Автор: Kief Morris Издательство: O’Reilly Media, Inc. Год: 2021-01-15 Страниц: 430 Язык: английский Формат: pdf (true), epub Размер: 10.1 MB, 10.1 MB
Just five years ago, infrastructure as code was a new concept for many companies. Today, even banks, governments, and other highly regulated organizations are moving to the cloud, leading teams everywhere to build up large, complex infrastructure codebases. With this practical book, Kief Morris of ThoughtWorks shows you how to effectively use principles, practices, and patterns pioneered by infrastructure and development teams to manage cloud age infrastructure. Ideal for system administrators, infrastructure engineers, software developers, team leads, and architects, this insightful second edition demonstrates the tools you need for implementing infrastructure as code. |
Разместил: Ingvar16 4-02-2021, 16:02 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: What Are the Dangers of Online Scams? Автор: John Allen Издательство: Referencepoint Press Год: 2020 Формат: PDF Размер: 10 Мб Язык: английский / English
As more people conduct business and social activity on the internet, the opportunities for online scams have exploded. The growth of online scams has led to an industry dedicated to stopping them. |
Разместил: black 4-02-2021, 13:23 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Understanding Network Hacks: Attack and Defense with Python 3, 2nd Edition Автор: Bastian Ballmann Издательство: Springer Год: 2021 Формат: PDF, EPUB Страниц: 235 Размер: 17 Mb Язык: English
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting, Bluetooth and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code. |
Разместил: vitvikvas 3-02-2021, 12:40 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Simulation for Cyber-Physical Systems Engineering: A Cloud-Based Context (Simulation Foundations, Methods and Applications) Автор: Jose L. Risco Mart?n (Editor), Saurabh Mittal (Editor), Tuncer Oren (Editor) Издательство: Springer Год: 2020 Формат: true pdf/epub Страниц: 453 Размер: 67.4 Mb Язык: English
This comprehensive book examines a range of examples, prepared by a diverse group of academic and industry practitioners, which demonstrate how cloud-based simulation is being extensively used across many disciplines, including cyber-physical systems engineering. This book is a compendium of the state of the art in cloud-based simulation that instructors can use to inform the next generation. It highlights the underlying infrastructure, modeling paradigms, and simulation methodologies that can be brought to bear to develop the next generation of systems for a highly connected society. Such systems, aptly termed cyber-physical systems (CPS), are now widely used in e.g. transportation systems, smart grids, connected vehicles, industrial production systems, healthcare, education, and defense. |
Разместил: bomboane 3-02-2021, 08:59 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Computer Networking: A Top-Down Approach, Eighth Edition Автор: James Kurose, Keith Ross Издательство: Pearson Год: 2021 Формат: True PDF Страниц: 774 Размер: 14.4 Mb Язык: English
A top-down, layered approach to computer networking. Unique among computer networking texts, the 8th Edition of the popular Computer Networking: A Top Down Approach builds on the authors’ long tradition of teaching this complex subject through a layered approach in a “top-down manner.” |
Разместил: bomboane 2-02-2021, 17:09 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
 Название: Серия "Мир технологий" в 3 книгах Автор(ы): разные Издательство: Москва Год: 2018-2019 Страниц: 1000+ Формат: fb2, pdf Размер: 15 Мб Язык: русский Серия: Мир технологий
Вашу почту читают, за вашими передвижениями следят, а «умный» телевизор записывает все ваши разговоры. Нет, это не сценарий очередной антиутопии, это наша повседневная жизнь. И если вы думаете, что вашими персональными данными никто не интересуется, то вы глубоко заблуждаетесь.
|
Разместил: MIHAIL62 2-02-2021, 06:03 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
 Название: Cognitive Wireless Networks: Concepts, Methodologies and Visions Inspiring the Age of Enlightenment of Wireless Communications Автор: Frank H. P. Fitzek (Editor), Marcos D. Katz (Editor) Издательство: Springer; 2007 edition Год: 2007 Формат: PDF Страниц: 714 pages Размер: 79.08 MB Язык: English
This book advocates the idea of breaking up the cellular communication architecture by introducing cooperative strategies among wireless devices through cognitive wireless networking. It details the cooperative and cognitive aspects for future wireless communication networks. Coverage includes social and biological inspired behavior applied to wireless networks, peer-to-peer networking, cooperative networks, and spectrum sensing and management. |
Разместил: vikCAT 31-01-2021, 10:39 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Game Theory for Cyber Deception: From Theory to Applications Автор: Jeffrey Pawlick, Quanyan Zhu Издательство: Birkhauser Год: 2021 Формат: PDF, EPUB Страниц: 192 Размер: 25 Mb Язык: English
This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the context of emerging problems such as privacy against ubiquitous tracking in the Internet of things (IoT), dynamic honeynets for the observation of advanced persistent threats (APTs), and active defense against physical denial-of-service (PDoS) attacks. Because of its uniquely thorough treatment of cyber deception, this book will serve as a timely contribution and valuable resource in this active field. The opening chapters introduce both cybersecurity in a manner suitable for game theorists and game theory as appropriate for cybersecurity professionals. Chapter Four then guides readers through the specific field of defensive cyber deception. A key feature of the remaining chapters is the development of a signaling game model for the species of leaky deception featured in honeypots and honeyfiles. This model is expanded to study interactions between multiple agents with varying abilities to detect deception. |
Разместил: vitvikvas 31-01-2021, 06:36 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Security in IoT Social Networks (Intelligent Data-Centric Systems: Sensor Collected Intelligence) Автор: Fadi Al-Turjman (Editor), B.D. Deebak (Editor) Издательство: Academic Press Год: 2021 Формат: true pdf/epub Страниц: 267 Размер: 42.5 Mb Язык: English
Security in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social and financial effects. Mining and analyzing enormously vast networks is a vital part of exploiting Big Data. This book provides insight into the technological aspects of modeling, searching, and mining for corresponding research issues, as well as designing and analyzing models for resolving such challenges. The book will help start-ups grow, providing research directions concerning security mechanisms and protocols for social information networks. The book covers structural analysis of large social information networks, elucidating models and algorithms and their fundamental properties. |
Разместил: bomboane 29-01-2021, 20:29 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
br>
|