Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAMНазвание: Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM
Автор: Regner Sabillon
Издательство: IGI Global
Год: 2021
Страниц: 275
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB

With the continued progression of technologies such as mobile computing and the internet of things (IoT), cybersecurity has swiftly risen to a prominent field of global interest. This has led to cyberattacks and cybercrime becoming much more sophisticated to a point where cybersecurity can no longer be the exclusive responsibility of an organization's information technology (IT) unit. Cyber warfare is becoming a national issue and causing various governments to reevaluate the current defense strategies they have in place.
Разместил: Ingvar16 11-03-2021, 12:48 | Комментарии: 0 | Подробнее
Название: AI and Cloud Computing (Advances in Computers Volume 120)
Автор: Ali R. Hurson (Editor), Sheng Wu (Editor)
Издательство: Elsevier
Год: 2021
Формат: true pdf/epub
Страниц: 244
Размер: 61.1 Mb
Язык: English

AI and Cloud Computing, Volume 120 in the Advances in Computers series, highlights new advances in the field, with this updated volume presenting interesting chapters on topics including A Deep-forest based Approach for Detecting Fraudulent Online Transaction, Design of Cyber-Physical-Social Systems with Forensic-awareness Based on Deep Learning, Review on Privacy-preserving Data Comparison Protocols in Cloud Computing, Fingerprint Liveness Detection Using an Improved CNN with the Spatial Pyramid Pooling Structure, Protecting Personal Sensitive Data Security in the Cloud with Blockchain, and more.
Разместил: bomboane 8-03-2021, 12:16 | Комментарии: 0 | Подробнее
Название: How Cybersecurity Really Works: A Hands-On Guide for Total Beginners (Early Access)
Автор: Sam Grubb
Издательство: No Starch Press
Год: 2/25/2021
Формат: true pdf/azw3
Размер: 10.5 Mb
Язык: English

Cybersecurity for Beginners is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as how to defend yourself and organizations against online attacks.
You don’t need a technical background to understand core cybersecurity concepts and their practical applications – all you need is this book. It covers all the important stuff and leaves out the jargon, giving you a broad view of how specific attacks work and common methods used by online adversaries, as well as the controls and strategies you can use to defend against them.
Разместил: bomboane 6-03-2021, 20:12 | Комментарии: 0 | Подробнее
Название: Enterprise Wireless Local Area Network Architectures and Technologies
Автор: Rihai Wu, Xun Yang, Xia Zhou, Yibo Wang
Издательство: CRC Press
Год: 2021
Формат: True PDF
Страниц: 445
Размер: 27.7 Mb
Язык: English

This book has been written with the support of Huawei's large accumulation of technical knowledge and experience in the WLAN field, as well as its understanding of customer service requirements. First, the book covers service challenges facing enterprise wireless networks, along with detailing the latest evolution of Wi-Fi standards, air interface performance, and methods for improving user experience in enterprise scenarios. Furthermore, it illustrates typical networking, planning, and scenario-specific design for enterprise WLANs, and provides readers with a comprehensive understanding of enterprise WLAN planning, design, and technical implementation, as well as suggestions for deployment.
Разместил: bomboane 4-03-2021, 10:43 | Комментарии: 0 | Подробнее
Название: Wireless and Mobile Device Security, Second Edition
Автор: Jim Doherty
Издательство: Jones & Bartlett Learning
Год: 2021
Формат: epub/pdf(conv.)
Страниц: 400
Размер: 11.7 Mb
Язык: English

The world of wireless and mobile devices is evolving rapidly, with many individuals relying solely on their wireless devices in the workplace and in the home. The growing use of mobile devices demands that organizations become more educated in securing this technology and determining how to best protect their assets. Written by an industry expert, Wireless and Mobile Device Security, Second Edition explores the evolution of wired networks to wireless networking and its impact on the corporate world.
Разместил: bomboane 2-03-2021, 20:07 | Комментарии: 0 | Подробнее
Название: 5G: An Introduction to the 5th Generation Mobile Networks
Автор: Ulrich Trick
Издательство: De Gruyter Oldenbourg
Год: 2021
Формат: true pdf/epub
Страниц: 294
Размер: 24.5 Mb
Язык: English

With 5G, telecommunications networks have entered a new phase. 5G mobile networks use unique concepts and technologies to deliver current and future applications across a wide spectrum, from high bit-rate smartphones to high-availability car-to-x and mass IoT applications.
Разместил: bomboane 2-03-2021, 10:40 | Комментарии: 0 | Подробнее
Название: Cloud Data Center Network Architectures and Technologies (Data Communication Series)
Автор: Lei Zhang and Le Chen
Издательство: CRC Press
Год: 2021
Формат: True PDF
Страниц: 525
Размер: 30.4 Mb
Язык: English

Cloud Data Center Network Architectures and Technologies has been written with the support of Huawei's vast technical knowledge and experience in the data center network (DCN) field, as well as its understanding of customer service requirements. This book describes in detail the architecture design, technical implementation, planning and design, and deployment suggestions for cloud DCNs based on the service challenges DCNs encounter. It starts by describing the overall architecture and technical evolution of DCNs, with the aim of helping readers understand the development of DCNs.
Разместил: bomboane 1-03-2021, 14:47 | Комментарии: 0 | Подробнее
Название: Нечеткие модели и сети
Автор: Борисов В.В., Круглов В.В., Федулов А.С.
Издательство: Горячая линия-Телеком
Год: 2018 - 2-е изд.
Cтраниц: 284
Формат: pdf (ocr)
Размер: 41 мб
Язык: русский

Книга посвящена исследованию нечетких моделей, используемых для описания, анализа и моделирования сложных слабо формализуемых систем и процессов, а также вопросам построения, обучения и использования, во-первых, нечетких нейронных сетей, реализующих нечеткие продукционные, реляционные и функциональные модели, во-вторых, нейронных нечетких сетей, характеризующихся введением нечеткости в различные компоненты традиционных нейронных сетей.
Разместил: rivasss 27-02-2021, 09:59 | Комментарии: 0 | Подробнее
Название: Zero Trust Security: An Enterprise Guide
Автор: Jason Garbis, Jerry W. Chapman
Издательство: Apress
Год: 2021
Формат: true pdf/epub
Страниц: 306
Размер: 11.4 Mb
Язык: English

Understand how Zero Trust security can and should integrate into your organization. This book covers the complexity of enterprise environments and provides the realistic guidance and requirements your security team needs to successfully plan and execute a journey to Zero Trust while getting more value from your existing enterprise security architecture. After reading this book, you will be ready to design a credible and defensible Zero Trust security architecture for your organization and implement a step-wise journey that delivers significantly improved security and streamlined operations.
Разместил: bomboane 26-02-2021, 23:07 | Комментарии: 0 | Подробнее
Название: Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges and Countermeasures
Автор: Brij B. Gupta, Amrita Dahiya
Издательство: CRC Press
Год: 2021
Формат: PDF
Страниц: 140
Размер: 10 Mb
Язык: English

The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration. The book, DDoS Attacks – Classification, Attacks, Challenges, and Countermeasures, provides an overview of both types of defensive solutions proposed so far, exploring different dimensions that would mitigate the DDoS effectively and show the implications associated with them.
Разместил: vitvikvas 26-02-2021, 11:34 | Комментарии: 0 | Подробнее
 MyMirKnig.ru  ©2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности