|
 |
|
 |
|
|
 |
|  |
|
Название: Networking and Computation: Technology, Modeling and Performance Second edition Автор: Thomas G. Robertazzi, Li Shi Издательство: Springer Год: 2020 Формат: true pdf/epub Страниц: 225 Размер: 25.9 Mb Язык: English
This useful volume adopts a balanced approach between technology and mathematical modeling in computer networks, covering such topics as switching elements and fabrics, Ethernet, and ALOHA design. The discussion includes a variety of queueing models, routing, protocol verification and error codes and divisible load theory, a new modeling technique with applications to grids and parallel and distributed processing. Examples at the end of each chapter provide ample material for practice. |
Разместил: bomboane 17-03-2020, 15:32 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Policy Implications of Virtual Work Автор: Pamela Meil and Vassil Kirov Издательство: Palgrave Macmillan Год: 2017 Формат: EPUB, PDF Размер: 10 Мб Язык: английский / English
This collection presents an array of policy debates and implications emerging from virtual work. The authors cover a range of areas, including: conceptual debates, measuring virtual work; discourses and levels of policy intervention; the role of the sharing and collaborative economy; and resultant challenges for organized labour, law and regulation. The authors of the chapters analyse the ways in which processes of digitalization leading to virtual work impact so many aspects of our lives: the way we buy, sell, network, communicate, participate, create, consume, and, of course, the way we work. In turn they focus on the subsequent implications for the future of work as well as the viability of existing social protection systems. |
Разместил: black 17-03-2020, 15:05 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: A Prehistory of the Cloud Автор: Tung-Hui Hu Издательство: MIT Press Год: 2016 Формат: EPUB Размер: 20 Мб Язык: английский / English
The militarized legacy of the digital cloud: how the cloud grew out of older network technologies and politics. We may imagine the digital cloud as placeless, mute, ethereal, and unmediated. Yet the reality of the cloud is embodied in thousands of massive data centers, any one of which can use as much electricity as a midsized town. Even all these data centers are only one small part of the cloud. Behind that cloud-shaped icon on our screens is a whole universe of technologies and cultural norms, all working to keep us from noticing their existence. In this book, Tung-Hui Hu examines the gap between the real and the virtual in our understanding of the cloud. |
Разместил: black 17-03-2020, 14:58 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Wireless Sensor Systems for Extreme Environments: Space, Underwater, Underground and Industrial Автор: Ali Abedi and Habib F. Rashvand Издательство: Wiley Год: 2017 Формат: PDF Размер: 29 Мб Язык: английский / English
This book covers the challenging aspects of wireless sensor systems and the problems and conditions encountered when applying them in outer space, under the water, below the ground, and in extreme industrial environments. It explores the unique aspects of designs and solutions that address those problems and challenges, and illuminates the connections, similarities, and differences between the challenges and solutions in those various environments. |
Разместил: black 17-03-2020, 14:57 | Комментарии: 1 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Spinning the Semantic Web Автор: Dieter Fensel and James A. Hendler Издательство: The MIT Press Год: 2003 Формат: PDF Размер: 15 Мб Язык: английский / English
As the World Wide Web continues to expand, it becomes increasingly difficult for users to obtain information efficiently. Because most search engines read format languages such as HTML or SGML, search results reflect formatting tags more than actual page content, which is expressed in natural language. Spinning the Semantic Web describes an exciting new type of hierarchy and standardization that will replace the current "web of links" with a "web of meaning." Using a flexible set of languages and tools, the Semantic Web will make all available information -- display elements, metadata, services, images, and especially content accessible. |
Разместил: black 16-03-2020, 20:37 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: AWS Certified SysOps Administrator Study Guide: Associate SOA-C01 Exam Second Edition Автор: Brett McLaughlin, Sara Perrott Издательство: Sybex Год: 2020 Формат: epub Страниц: 512 Размер: 15.5 Mb Язык: English
Your #1 all-in-one reference and exam Study Guide for the UPDATED AWS SysOps Administrator certification! This comprehensive book guides readers through the role of a SysOps Administrator and helps prepare candidates to take the updated AWS Certified SysOps Administrator―Associate (SOA-C01) Exam. The AWS Certified SysOps Administrator―Associate certification validates technical expertise in deployment, management, and operations on the AWS platform. |
Разместил: bomboane 15-03-2020, 11:28 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Secrets of a Cyber Security Architect Автор: Brook S. E. Schoenfield Издательство: Auerbach Publications Год: 2019 Страниц: 254 Язык: английский Формат: pdf (true) Размер: 10.1 MB
Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered 'valuable'? By “system architectures” I meant to include any system that requires digital security, be it the architecture of a discrete application or program, a library or application programming interface (API), a global cloud, an organization’s digital assets, etc. Th ough my definition may have sufficed for the purposes of a book on threat modeling, it still feels a bit too opaque, and I fear that it excludes some important aspects. |
Разместил: Ingvar16 15-03-2020, 03:52 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Методы и средства защиты информации Автор: Хорошко В.А., Чекатков А.А. Издательство: Юниор Год: 2003 Cтраниц: 476 Формат: pdf Размер: 11 мб Язык: русский
Книга предназначена широкому кругу читателей: от технического специалиста, связанного с использованием средств защиты информации, до рядового пользователя современных информационных технологий. Однако наиболее полезна книга будет специалистам в области технической защиты информации, защиты информации в автоматизированных системах, организации комплексной защиты информации, а также руководителям предприятий, учреждений и организаций, нуждающихся в защите своей информации. |
Разместил: rivasss 13-03-2020, 18:50 | Комментарии: 2 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Securing Office 365: Masterminding MDM and Compliance in the Cloud Автор: Matthew Katzer Издательство: Apress Год: 2019 Язык: английский Формат: pdf (true), epub Размер: 77.5 MB
Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office. Data breaches, compliance fines, and distribution of personally identifiable information (PII) without encryption or safeguards place businesses of all types at risk. In today’s electronic world, you must have a secure digital footprint that is based on business processes that are designed to protect information. This book is written for business owners, chief information security officers (CISO), and IT managers who want to securely configure Office 365. You will follow the Microsoft cybersecurity road map through a progressive tutorial on how to configure the security services in Office 365 to protect and manage your business. |
Разместил: bomboane 13-03-2020, 11:49 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking Автор: Jennifer Kurtz Издательство: Syngress Год: 2016 Формат: True PDF/ePub Страниц: 172 Размер: 10.2 Mb Язык: English
Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically. |
Разместил: bomboane 12-03-2020, 05:22 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
br>
|