|
|
|
|
|
|
|
| |
|
Название: Using Adobe Connect 9.5 Автор: Todd McCall Издательство: CreateSpace Independent Publishing Год: 2016 Формат: PDF, EPUB Размер: 15,7 Мб Язык: английский / English
eStruct workbooks guide you to proficiency by following a simple philosophy: start at the beginning, and build. In this introductory workbook you will be walked through the process of creating meeting rooms, adding and editing users, and running a meeting using multiple layouts and features. With the help of instructor quick tips, you will be fully equipped to virtually engage and interact with your audience. As a Meeting Host you will be able to run effective, time-saving meetings. As more organizations and teams move toward a virtual environment, it is important that you establish and maintain a high level of interaction and collaboration. |
Разместил: _аdmin_ 26-07-2020, 15:01 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Foundations of Information Security: A Straightforward Introduction Автор: Jason Andress Издательство: No Starch Press Год: 2019 Формат: epub/azw3/pdf(conv.), true pdf Страниц: 380 Размер: 11.4 Mb, 15.2 Mb Язык: English
High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing. |
Разместил: bomboane 25-07-2020, 11:40 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Abusing the Internet of Things Автор: Nitesh Dhanjani Издательство: O'Reilly Media Год: 2015 Формат: PDF, EPUB Размер: 66 Мб Язык: английский / English
A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars. |
Разместил: black 25-07-2020, 11:02 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Системы коммутации Автор: Гольдштейн Б. С. Издательство: СПб.: БХВ-Санкт-Петербург Год: 2003 ISBN: 5-8206-0108-4 Формат: pdf Страниц: 316 Размер: 73,6 Mb Язык: Русский
Учебник охватывает широкий спектр вопросов автоматической коммутации и предназначен для студентов телекоммуникационных университетов и других высших учебных заведений, обучающихся по специальности 200900 - «Сети связи и системы коммутации», а также по специальностям 201000 - «Многоканальные телекоммуникационные системы» и 550400 - «Телекоммуникации» и соответствует программе, утвержденной Управлением руководящих кадров и учебных заведений Министерства Российской Федерации по связи и информатизации. |
Разместил: oksanavalera 24-07-2020, 16:16 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Microsoft Azure: Planning, Deploying, and Managing the Cloud Second Edition Автор: Julian Soh, Marshall Copeland, Anthony Puca Издательство: Apress Год: 2020 Формат: true pdf/epub Страниц: 556 Размер: 40.7 Mb Язык: English
Gain the technical and business insight needed to plan, deploy, and manage the services provided by the Microsoft Azure cloud. This second edition focuses on improving operational decision tipping points for the professionals leading DevOps and security teams. This will allow you to make an informed decision concerning the workloads appropriate for your growing business in the Azure public cloud. Microsoft Azure starts with an introduction to Azure along with an overview of its architecture services such as IaaS and PaaS. You’ll also take a look into Azure’s data, artificial intelligence, and machine learning services. Moving on, you will cover the planning for and adoption of Azure where you will go through budgeting, cloud economics, and designing a hybrid data center. Along the way, you will work with web apps, network PaaS, virtual machines, and much more. |
Разместил: bomboane 24-07-2020, 13:00 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Локальные сети: Полное руководство Автор: Андэрсон К., Минаси М. Издательство: К.: ВЕК+, СПб.: КОРОНА принт Год: 1999 Cтраниц: 624 Формат: pdf Размер: 16 мб Язык: русский
Эта книга представляет практический, систематизированный взгляд на компоненты сети, их взаимодействие и роль в вашем бизнесе. Независимо от того, собираетесь ли выстроить свою сеть "с нуля" или хотите модернизировать уже созданную ранее, эта книга поможет вам выбрать технологию, которая сделает эту модернизацию наиболее эффективной. Если вы хотите создать сеть самостоятельно, книга ознакомит вас со всеми концепциями и методиками, необходимыми для того, чтобы сделать всю работу правильно с первого раза. |
Разместил: rivasss 24-07-2020, 10:45 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation 3rd Edition Автор: Ted G. Lewis Издательство: Wiley Год: 2020 Формат: True PDF Страниц: 464 Размер: 28.8 Mb Язык: English
Covers critical infrastructure protection, providing a rigorous treatment of risk, resilience, complex adaptive systems, and sector dependence Wide in scope, this classroom-tested book is the only one to emphasize a scientific approach to protecting the key infrastructures components of a nation. It analyzes the complex network of entities that make up a nation's infrastructure, and identifies vulnerabilities and risks in various sectors by combining network science, complexity theory, risk analysis, and modeling and simulation. This approach reduces the complex problem of protecting water supplies, energy pipelines, telecommunication stations, power grid, and Internet and Web networks to a much simpler problem of protecting a few critical nodes. |
Разместил: bomboane 23-07-2020, 05:09 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: .Net. Сетевое программирование для профессионалов Автор: Эндрю Кровчик, Винод Кумар и др. Издательство: Лори Год: 2007 ISBN: 1-86100-735-3 Формат: pdf Страниц: 417 Размер: 101 Mb Язык: Русский
Сетевая организация ПО - одна из центральных задач программирования при разработке бизнес-приложений. Прочитав книгу, вы сможете уверенно программировать сетевые задачи в .NET и будете понимать основные протоколы. |
Разместил: oksanavalera 22-07-2020, 17:15 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Multiagent Systems: Introduction and Coordination Control Автор: Magdi S. Mahmoud Издательство: CRC Press Год: 2020 Формат: True PDF Страниц: 414 Размер: 10 Mb Язык: English
Multiagent systems (MAS) are one of the most exciting and the fastest growing domains in the intelligent resource management and agent-oriented technology, which deals with modeling of autonomous decisions making entities. Recent developments have produced very encouraging results in the novel approach of handling multiplayer interactive systems. In particular, the multiagent system approach is adapted to model, control, manage or test the operations and management of several system applications including multi-vehicles, microgrids, multi-robots, where agents represent individual entities in the network. Each participant is modeled as an autonomous participant with independent strategies and responses to outcomes. They are able to operate autonomously and interact pro-actively with their environment. |
Разместил: bomboane 22-07-2020, 13:13 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cyber Strategy: Risk-Driven Security and Resiliency Автор: Carol A. Siegel, Mark Sweeney Издательство: CRC Press Год: 2020 Формат: True PDF Страниц: 214 Размер: 12.8 Mb Язык: English
Cyber Strategy: Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies. It demonstrates a methodology for companies to combine their disassociated efforts into one corporate plan with buy-in from senior management that will efficiently utilize resources, target high risk threats, and evaluate risk assessment methodologies and the efficacy of resultant risk mitigations. The book discusses all the steps required from conception of the plan from preplanning (mission/vision, principles, strategic objectives, new initiatives derivation), project management directives, cyber threat and vulnerability analysis, cyber risk and controls assessment to reporting and measurement techniques for plan success and overall strategic plan performance. In addition, a methodology is presented to aid in new initiative selection for the following year by identifying all relevant inputs. |
Разместил: bomboane 22-07-2020, 12:42 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|