Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Название: The Effective CISSP: Security and Risk Management
Автор: Wentz Wu
Издательство: Amazon
Год: 2020
Формат: true pdf/epub
Страниц: 316
Размер: 4.3 Mb
Язык: English

The Effective CISSP: Security and Risk Management is for CISSP aspirants and those who are interested in information security or confused by cybersecurity buzzwords and jargon. It is a supplement, not a replacement, to the CISSP study guides that CISSP aspirants have used as their primary source. It introduces core concepts, not all topics, of Domain 1 in the CISSP CBK - Security and Risk Management. It helps CISSP aspirants build a conceptual security model or blueprint so that they can proceed to read other materials, learn confidently and with less frustration, and pass the CISSP exam accordingly.
Разместил: bomboane 24-04-2020, 20:12 | Комментарии: 0 | Подробнее
Название: Diameter: New Generation AAA Protocol - Design, Practice, and Applications
Автор: Hannes Tschofenig, Sebastien Decugis, Jean Mahoney
Издательство: Wiley
Год: 2019
Формат: True PDF
Страниц: 230
Размер: 13 Mb
Язык: English

Presents the principles, design, development and applications of the Diameter protocol suite
The Diameter protocol was born in the Internet Engineering Task Force (IETF) and designed to be a general-purpose Authentication, Authorization, and Accounting (AAA) protocol applicable to many network environments. This book is for everyone who wants to understand the Diameter protocol and its applications. This book explains the place Diameter holds in global telecommunication networks and teaches system architects and designers how to incorporate Diameter into their network environments.
Разместил: bomboane 24-04-2020, 17:39 | Комментарии: 0 | Подробнее
Название: Mobile Information Service for Networks
Автор: Jiang, Changjun, Li, Zhong
Издательство: Springer
Год: 2020
Формат: True PDF/EPUB
Страниц: 250
Размер: 50.1 Mb
Язык: English

Provides detailed information on fundamental supporting technologies for mobile information services for networks
Shares tips and insights into the development of applications and key technologies in the domains of intelligent transportation, smart tourism, and mobile payment
Broadens readers’ understanding of the mobile information service platform used by the authors

Разместил: bomboane 24-04-2020, 12:50 | Комментарии: 0 | Подробнее
Название: Analyzing Social Media Networks with NodeXL: Insights from a Connected World Second Edition
Автор: Hansen Ph.D. University of Michigan, Derek, Shneiderman Ph.D. SUNY at Stony Brook, Ben, Smith Ph.D. UCLA Los Angeles CA, Marc A
Издательство: Morgan Kaufmann
Год: 2019
Формат: epub, true pdf
Страниц: 248
Размер: 111.8 Mb, 15 Mb
Язык: English

Analyzing Social Media Networks with NodeXL: Insights from a Connected World, Second Edition, provides readers with a thorough, practical and updated guide to NodeXL, the open-source social network analysis (SNA) plug-in for use with Excel. The book analyzes social media, provides a NodeXL tutorial, and presents network analysis case studies, all of which are revised to reflect the latest developments. Sections cover history and concepts, mapping and modeling, the detailed operation of NodeXL, and case studies, including e-mail, Twitter, Facebook, Flickr and YouTube. In addition, there are descriptions of each system and types of analysis for identifying people, documents, groups and events.
Разместил: bomboane 24-04-2020, 11:38 | Комментарии: 0 | Подробнее
Название: Ethical Hacking: Best Tips and Tricks of Ethical Hacking
Автор: Elijah Lewis
Издательство: Amazon
Год: 2020
Формат: PDF
Страниц: 93
Размер: 0.6 Mb
Язык: English

This book is for those of you looking to adding more skills to your arsenal. It touches upon all topics that an ethical hacker should know about and how to implement the skills of a professional hacker.
The book will provide a brief history of ethical hacking. You will learn what ethical hacking means and how this term is different from general hacking. Hacking topics include physical threats as well as the non-physical threats in an organization that all skilled ethical hackers must understand.
Разместил: bomboane 23-04-2020, 18:58 | Комментарии: 0 | Подробнее
Cybersecurity and Decision Makers: Data Security and Digital TrustНазвание: Cybersecurity and Decision Makers: Data Security and Digital Trust
Автор: Marie De Freminville
Издательство: Wiley-ISTE
Год: 2020
Страниц: 211
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping
Разместил: Ingvar16 23-04-2020, 15:27 | Комментарии: 0 | Подробнее
Название: Spatial Computing (MIT Press Essential Knowledge series)
Автор: Shashi Shekhar, Pamela Vold
Издательство: The MIT Press
Год: 2019
Формат: true pdf/epub/azw3
Страниц: 258
Размер: 10 Mb
Язык: English

An accessible guide to the ideas and technologies underlying such applications as GPS, Google Maps, Pok?mon Go, ride-sharing, driverless cars, and drone surveillance.
Billions of people around the globe use various applications of spatial computing daily—by using a ride-sharing app, GPS, the e911 system, social media check-ins, even Pok?mon Go. Scientists and researchers use spatial computing to track diseases, map the bottom of the oceans, chart the behavior of endangered species, and create election maps in real time. Drones and driverless cars use a variety of spatial computing technologies. Spatial computing works by understanding the physical world, knowing and communicating our relation to places in that world, and navigating through those places.
Разместил: bomboane 23-04-2020, 10:57 | Комментарии: 0 | Подробнее
Название: LPWAN Technologies for IoT and M2M Applications
Автор: Bharat S. Chaudhari (Editor), Marco Zennaro (Editor)
Издательство: Academic Press
Год: 2020
Формат: True PDF
Страниц: 432
Размер: 22.4 Mb
Язык: English

Low power wide area network (LPWAN) is a promising solution for long range and low power Internet of Things (IoT) and machine to machine (M2M) communication applications. The LPWANs are resource-constrained networks and have critical requirements for long battery life, extended coverage, high scalability, and low device and deployment costs. There are several design and deployment challenges such as media access control, spectrum management, link optimization and adaptability, energy harvesting, duty cycle restrictions, coexistence and interference, interoperability and heterogeneity, security and privacy, and others.
Разместил: bomboane 21-04-2020, 20:06 | Комментарии: 0 | Подробнее
Название: Cisco CCNA Networking for Beginners
Автор: Kumar Janglu
Издательство: Amazon.com Services LLC
Год: 2020
Формат: epub/pdf(conv.)
Страниц: 624
Размер: 13.1 Mb
Язык: English

Networks and networking have grown exponentially over the last 15 years understandably so. They have had to evolve at light speed just to keep up with huge increases in basic mission-critical user needs such as sharing data and printers as well as more advanced demands such as videoconferencing. Unless everyone who needs to share network resources is located in the same office are which is an increasingly uncommon situation, the challenge is to connect the sometimes many relevant networks together so all users can share the network’s wealth.
Разместил: bomboane 21-04-2020, 16:55 | Комментарии: 0 | Подробнее
Networking Hacking: Complete guide tools for computer wireless network technology, connections and communications system. Practical penetration of a network via services and hardware.Название: Networking Hacking: Complete guide tools for computer wireless network technology, connections and communications system. Practical penetration of a network via services and hardware
Автор: Erickson Karnel
Издательство: Amazon.com Services LLC
Год: 2019
Страниц: 148
Язык: английский
Формат: epub
Размер: 10.1 MB

The book will teach you the basics of a computer network, countermeasures that you can use to prevent a social engineering and physical attack and how to assess the physical vulnerabilities within your organization. By reading it, you will learn of all the possible dangers that your network is facing. First of all, how hackers get the administrator passwords and the different tools they use to crack them. Some of these tools, accompanied by a manual, will be in this context.
Разместил: Ingvar16 21-04-2020, 01:35 | Комментарии: 0 | Подробнее
 MyMirKnig.ru  ©2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности