|
|
|
|
|
|
|
| |
|
Название: The Effective CISSP: Security and Risk Management Автор: Wentz Wu Издательство: Amazon Год: 2020 Формат: true pdf/epub Страниц: 316 Размер: 4.3 Mb Язык: English
The Effective CISSP: Security and Risk Management is for CISSP aspirants and those who are interested in information security or confused by cybersecurity buzzwords and jargon. It is a supplement, not a replacement, to the CISSP study guides that CISSP aspirants have used as their primary source. It introduces core concepts, not all topics, of Domain 1 in the CISSP CBK - Security and Risk Management. It helps CISSP aspirants build a conceptual security model or blueprint so that they can proceed to read other materials, learn confidently and with less frustration, and pass the CISSP exam accordingly. |
Разместил: bomboane 24-04-2020, 20:12 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Diameter: New Generation AAA Protocol - Design, Practice, and Applications Автор: Hannes Tschofenig, Sebastien Decugis, Jean Mahoney Издательство: Wiley Год: 2019 Формат: True PDF Страниц: 230 Размер: 13 Mb Язык: English
Presents the principles, design, development and applications of the Diameter protocol suite The Diameter protocol was born in the Internet Engineering Task Force (IETF) and designed to be a general-purpose Authentication, Authorization, and Accounting (AAA) protocol applicable to many network environments. This book is for everyone who wants to understand the Diameter protocol and its applications. This book explains the place Diameter holds in global telecommunication networks and teaches system architects and designers how to incorporate Diameter into their network environments. |
Разместил: bomboane 24-04-2020, 17:39 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Mobile Information Service for Networks Автор: Jiang, Changjun, Li, Zhong Издательство: Springer Год: 2020 Формат: True PDF/EPUB Страниц: 250 Размер: 50.1 Mb Язык: English
Provides detailed information on fundamental supporting technologies for mobile information services for networks Shares tips and insights into the development of applications and key technologies in the domains of intelligent transportation, smart tourism, and mobile payment Broadens readers’ understanding of the mobile information service platform used by the authors
|
Разместил: bomboane 24-04-2020, 12:50 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Analyzing Social Media Networks with NodeXL: Insights from a Connected World Second Edition Автор: Hansen Ph.D. University of Michigan, Derek, Shneiderman Ph.D. SUNY at Stony Brook, Ben, Smith Ph.D. UCLA Los Angeles CA, Marc A Издательство: Morgan Kaufmann Год: 2019 Формат: epub, true pdf Страниц: 248 Размер: 111.8 Mb, 15 Mb Язык: English
Analyzing Social Media Networks with NodeXL: Insights from a Connected World, Second Edition, provides readers with a thorough, practical and updated guide to NodeXL, the open-source social network analysis (SNA) plug-in for use with Excel. The book analyzes social media, provides a NodeXL tutorial, and presents network analysis case studies, all of which are revised to reflect the latest developments. Sections cover history and concepts, mapping and modeling, the detailed operation of NodeXL, and case studies, including e-mail, Twitter, Facebook, Flickr and YouTube. In addition, there are descriptions of each system and types of analysis for identifying people, documents, groups and events. |
Разместил: bomboane 24-04-2020, 11:38 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Ethical Hacking: Best Tips and Tricks of Ethical Hacking Автор: Elijah Lewis Издательство: Amazon Год: 2020 Формат: PDF Страниц: 93 Размер: 0.6 Mb Язык: English
This book is for those of you looking to adding more skills to your arsenal. It touches upon all topics that an ethical hacker should know about and how to implement the skills of a professional hacker. The book will provide a brief history of ethical hacking. You will learn what ethical hacking means and how this term is different from general hacking. Hacking topics include physical threats as well as the non-physical threats in an organization that all skilled ethical hackers must understand. |
Разместил: bomboane 23-04-2020, 18:58 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cybersecurity and Decision Makers: Data Security and Digital Trust Автор: Marie De Freminville Издательство: Wiley-ISTE Год: 2020 Страниц: 211 Язык: английский Формат: pdf (true) Размер: 10.1 MB
Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping |
Разместил: Ingvar16 23-04-2020, 15:27 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Spatial Computing (MIT Press Essential Knowledge series) Автор: Shashi Shekhar, Pamela Vold Издательство: The MIT Press Год: 2019 Формат: true pdf/epub/azw3 Страниц: 258 Размер: 10 Mb Язык: English
An accessible guide to the ideas and technologies underlying such applications as GPS, Google Maps, Pok?mon Go, ride-sharing, driverless cars, and drone surveillance. Billions of people around the globe use various applications of spatial computing daily—by using a ride-sharing app, GPS, the e911 system, social media check-ins, even Pok?mon Go. Scientists and researchers use spatial computing to track diseases, map the bottom of the oceans, chart the behavior of endangered species, and create election maps in real time. Drones and driverless cars use a variety of spatial computing technologies. Spatial computing works by understanding the physical world, knowing and communicating our relation to places in that world, and navigating through those places. |
Разместил: bomboane 23-04-2020, 10:57 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: LPWAN Technologies for IoT and M2M Applications Автор: Bharat S. Chaudhari (Editor), Marco Zennaro (Editor) Издательство: Academic Press Год: 2020 Формат: True PDF Страниц: 432 Размер: 22.4 Mb Язык: English
Low power wide area network (LPWAN) is a promising solution for long range and low power Internet of Things (IoT) and machine to machine (M2M) communication applications. The LPWANs are resource-constrained networks and have critical requirements for long battery life, extended coverage, high scalability, and low device and deployment costs. There are several design and deployment challenges such as media access control, spectrum management, link optimization and adaptability, energy harvesting, duty cycle restrictions, coexistence and interference, interoperability and heterogeneity, security and privacy, and others. |
Разместил: bomboane 21-04-2020, 20:06 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cisco CCNA Networking for Beginners Автор: Kumar Janglu Издательство: Amazon.com Services LLC Год: 2020 Формат: epub/pdf(conv.) Страниц: 624 Размер: 13.1 Mb Язык: English
Networks and networking have grown exponentially over the last 15 years understandably so. They have had to evolve at light speed just to keep up with huge increases in basic mission-critical user needs such as sharing data and printers as well as more advanced demands such as videoconferencing. Unless everyone who needs to share network resources is located in the same office are which is an increasingly uncommon situation, the challenge is to connect the sometimes many relevant networks together so all users can share the network’s wealth. |
Разместил: bomboane 21-04-2020, 16:55 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Networking Hacking: Complete guide tools for computer wireless network technology, connections and communications system. Practical penetration of a network via services and hardware Автор: Erickson Karnel Издательство: Amazon.com Services LLC Год: 2019 Страниц: 148 Язык: английский Формат: epub Размер: 10.1 MB
The book will teach you the basics of a computer network, countermeasures that you can use to prevent a social engineering and physical attack and how to assess the physical vulnerabilities within your organization. By reading it, you will learn of all the possible dangers that your network is facing. First of all, how hackers get the administrator passwords and the different tools they use to crack them. Some of these tools, accompanied by a manual, will be in this context. |
Разместил: Ingvar16 21-04-2020, 01:35 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|