Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Creating and Managing Virtual Machines and Networks Through Microsoft Azure Services for Remote Access ConnectionНазвание: Creating and Managing Virtual Machines and Networks Through Microsoft Azure Services for Remote Access Connection
Автор: Dr. Hidaia Mahmood Alassouli
Издательство: Independently published
Год: 2021
Страниц: 137
Язык: английский
Формат: pdf, azw3, epub
Размер: 15.4 MB

Microsoft Azure, commonly referred to as Azureis a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through Microsoft-managed data centers. It provides software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS) and supports many different programming languages, tools, and frameworks, including both Microsoft-specific and third-party software and systems.
Разместил: Ingvar16 4-02-2021, 18:25 | Комментарии: 0 | Подробнее
Infrastructure as Code: Dynamic Systems for the Cloud Age, Second Edition (Final)Название: Infrastructure as Code: Dynamic Systems for the Cloud Age, Second Edition
Автор: Kief Morris
Издательство: O’Reilly Media, Inc.
Год: 2021-01-15
Страниц: 430
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB, 10.1 MB

Just five years ago, infrastructure as code was a new concept for many companies. Today, even banks, governments, and other highly regulated organizations are moving to the cloud, leading teams everywhere to build up large, complex infrastructure codebases. With this practical book, Kief Morris of ThoughtWorks shows you how to effectively use principles, practices, and patterns pioneered by infrastructure and development teams to manage cloud age infrastructure. Ideal for system administrators, infrastructure engineers, software developers, team leads, and architects, this insightful second edition demonstrates the tools you need for implementing infrastructure as code.
Разместил: Ingvar16 4-02-2021, 16:02 | Комментарии: 0 | Подробнее
Название: What Are the Dangers of Online Scams?
Автор: John Allen
Издательство: Referencepoint Press
Год: 2020
Формат: PDF
Размер: 10 Мб
Язык: английский / English

As more people conduct business and social activity on the internet, the opportunities for online scams have exploded. The growth of online scams has led to an industry dedicated to stopping them.
Разместил: black 4-02-2021, 13:23 | Комментарии: 0 | Подробнее
Название: Understanding Network Hacks: Attack and Defense with Python 3, 2nd Edition
Автор: Bastian Ballmann
Издательство: Springer
Год: 2021
Формат: PDF, EPUB
Страниц: 235
Размер: 17 Mb
Язык: English

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting, Bluetooth and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code.
Разместил: vitvikvas 3-02-2021, 12:40 | Комментарии: 0 | Подробнее
Название: Simulation for Cyber-Physical Systems Engineering: A Cloud-Based Context (Simulation Foundations, Methods and Applications)
Автор: Jose L. Risco Mart?n (Editor), Saurabh Mittal (Editor), Tuncer Oren (Editor)
Издательство: Springer
Год: 2020
Формат: true pdf/epub
Страниц: 453
Размер: 67.4 Mb
Язык: English

This comprehensive book examines a range of examples, prepared by a diverse group of academic and industry practitioners, which demonstrate how cloud-based simulation is being extensively used across many disciplines, including cyber-physical systems engineering. This book is a compendium of the state of the art in cloud-based simulation that instructors can use to inform the next generation. It highlights the underlying infrastructure, modeling paradigms, and simulation methodologies that can be brought to bear to develop the next generation of systems for a highly connected society. Such systems, aptly termed cyber-physical systems (CPS), are now widely used in e.g. transportation systems, smart grids, connected vehicles, industrial production systems, healthcare, education, and defense.
Разместил: bomboane 3-02-2021, 08:59 | Комментарии: 0 | Подробнее
Название: Computer Networking: A Top-Down Approach, Eighth Edition
Автор: James Kurose, Keith Ross
Издательство: Pearson
Год: 2021
Формат: True PDF
Страниц: 774
Размер: 14.4 Mb
Язык: English

A top-down, layered approach to computer networking.
Unique among computer networking texts, the 8th Edition of the popular Computer Networking: A Top Down Approach builds on the authors’ long tradition of teaching this complex subject through a layered approach in a “top-down manner.”
Разместил: bomboane 2-02-2021, 17:09 | Комментарии: 0 | Подробнее

Название: Серия "Мир технологий" в 3 книгах
Автор(ы): разные
Издательство: Москва
Год: 2018-2019
Страниц: 1000+
Формат: fb2, pdf
Размер: 15 Мб
Язык: русский
Серия: Мир технологий

Вашу почту читают, за вашими передвижениями следят, а «умный» телевизор записывает все ваши разговоры. Нет, это не сценарий очередной антиутопии, это наша повседневная жизнь. И если вы думаете, что вашими персональными данными никто не интересуется, то вы глубоко заблуждаетесь.


Разместил: MIHAIL62 2-02-2021, 06:03 | Комментарии: 0 | Подробнее

Название: Cognitive Wireless Networks: Concepts, Methodologies and Visions Inspiring the Age of Enlightenment of Wireless Communications
Автор: Frank H. P. Fitzek (Editor), Marcos D. Katz (Editor)
Издательство: Springer; 2007 edition
Год: 2007
Формат: PDF
Страниц: 714 pages
Размер: 79.08 MB
Язык: English

This book advocates the idea of breaking up the cellular communication architecture by introducing cooperative strategies among wireless devices through cognitive wireless networking. It details the cooperative and cognitive aspects for future wireless communication networks. Coverage includes social and biological inspired behavior applied to wireless networks, peer-to-peer networking, cooperative networks, and spectrum sensing and management.
Разместил: vikCAT 31-01-2021, 10:39 | Комментарии: 0 | Подробнее
Название: Game Theory for Cyber Deception: From Theory to Applications
Автор: Jeffrey Pawlick, Quanyan Zhu
Издательство: Birkhauser
Год: 2021
Формат: PDF, EPUB
Страниц: 192
Размер: 25 Mb
Язык: English

This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the context of emerging problems such as privacy against ubiquitous tracking in the Internet of things (IoT), dynamic honeynets for the observation of advanced persistent threats (APTs), and active defense against physical denial-of-service (PDoS) attacks. Because of its uniquely thorough treatment of cyber deception, this book will serve as a timely contribution and valuable resource in this active field.
The opening chapters introduce both cybersecurity in a manner suitable for game theorists and game theory as appropriate for cybersecurity professionals. Chapter Four then guides readers through the specific field of defensive cyber deception. A key feature of the remaining chapters is the development of a signaling game model for the species of leaky deception featured in honeypots and honeyfiles. This model is expanded to study interactions between multiple agents with varying abilities to detect deception.
Разместил: vitvikvas 31-01-2021, 06:36 | Комментарии: 0 | Подробнее
Название: Security in IoT Social Networks (Intelligent Data-Centric Systems: Sensor Collected Intelligence)
Автор: Fadi Al-Turjman (Editor), B.D. Deebak (Editor)
Издательство: Academic Press
Год: 2021
Формат: true pdf/epub
Страниц: 267
Размер: 42.5 Mb
Язык: English

Security in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social and financial effects. Mining and analyzing enormously vast networks is a vital part of exploiting Big Data. This book provides insight into the technological aspects of modeling, searching, and mining for corresponding research issues, as well as designing and analyzing models for resolving such challenges. The book will help start-ups grow, providing research directions concerning security mechanisms and protocols for social information networks. The book covers structural analysis of large social information networks, elucidating models and algorithms and their fundamental properties.
Разместил: bomboane 29-01-2021, 20:29 | Комментарии: 0 | Подробнее
 MyMirKnig.ru  ©2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности